WO2001011883A1 - System and method for securely distributing content to groups of receivers - Google Patents

System and method for securely distributing content to groups of receivers Download PDF

Info

Publication number
WO2001011883A1
WO2001011883A1 PCT/US2000/021337 US0021337W WO0111883A1 WO 2001011883 A1 WO2001011883 A1 WO 2001011883A1 US 0021337 W US0021337 W US 0021337W WO 0111883 A1 WO0111883 A1 WO 0111883A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
channel
key
program
provider
Prior art date
Application number
PCT/US2000/021337
Other languages
French (fr)
Inventor
Baiju V. Patel
Mark J. Baugher
Original Assignee
Intel Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corporation filed Critical Intel Corporation
Priority to JP2001515625A priority Critical patent/JP2003506974A/en
Priority to AU65196/00A priority patent/AU6519600A/en
Priority to EP00952513A priority patent/EP1205072A1/en
Publication of WO2001011883A1 publication Critical patent/WO2001011883A1/en
Priority to HK02104996.4A priority patent/HK1043273A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence

Definitions

  • the present invention relates generally to data communications and, more specifically, to protection of digital content distributed over a multicast network.
  • Conditional access controls are sometimes used by television (TV) networks where content (e.g., subscriptions to packages of channels) is sold to customers.
  • Conditional access controls permit individual, authorized receivers to receive selected content on a broadcast network, while denying access to the content to unauthorized receivers.
  • TV networks may be analog or digital and there are at least several conditional access control mechanisms available for each type of service.
  • Conditional access controls provide at least two common functions. First, conditional access controls protect the operator of a broadcast network from theft of content by non- paying or other unauthorized customers. This function is important for home TV systems. Second, many conditional access controls use encryption to prevent theft of service. Conditional access controls have been promoted as a security solution for customers of business TV networks who are sensitive to having their business content disseminated unprotected over broadcast networks (such as satellite networks, for example).
  • digital TV content may also include data content, which may have a much higher value than traditional analog content (because original content can be retransmitted without any loss of information), and the same digital content may be distributed to selected groups of customers using multicast or unicast protocols for either data streams or files, additional functions for conditional access controls are desired to ensure that distributed digital content is protected against theft at the destinations to deter unauthorized copying and reuse of high-value data content.
  • Securing content that is multicast to a large group of customers may be accomplished through the use of symmetric key cryptography, asymmetric key cryptography, or both (e.g., a hybrid approach).
  • One approach is to use public key cryptography for authentication of the receiver prior to multicast distribution of the data, and to use a symmetric key to encrypt the multicast content. Once the receiver is authenticated, the receiver is given the symmetric key to decrypt the content.
  • One security limitation with this approach is that if one of the authorized receivers decides to share the symmetric key with unauthorized receivers, the unauthorized receivers may be able to receive the multicast content.
  • the risks associated with this problem increase when there are a very large number of authorized receivers, because there are more receivers who can violate the trust of the arrangement and distribute the key to unauthorized receivers.
  • the multicast content is distributed by satellite, if one of the authorized receivers decides to redistribute the key used for decryption, access to the content may become unlimited.
  • the receiver is authorized to receive the content, but is not trusted with the keys to that content, the keys may be protected through various known tamper resistant methods embedded in a trusted viewer application. This scheme complements communications security by protecting the keys used for communications security.
  • a mechanism combining communication security with content protection in a system is desired to protect multicast content both during transmission and upon reception within a broadcast or multicast network.
  • An embodiment of the present invention comprises an inter-network conditional access system for digital content.
  • the system includes at least one content provider to provide digital content, and at least one service provider, communicatively coupled to at least one content provider, to securely receive the digital content from at least one content provider and to securely distribute the digital content.
  • the content provider and the service provider may create a relationship of trust between themselves in one embodiment.
  • Another embodiment of the present invention comprises a method of providing digital content in an inter-network conditional access system.
  • the method includes encrypting digital content with at least one key, transmitting the encrypted digital content to at least one service provider, requesting creation of a secure channel for distribution of the encrypted digital content by at least one service provider, requesting creation of a program of data to be sent on the channel, the program comprising the encrypted digital content, and installing the at least one key at a content consumer for decrypting the program.
  • Another embodiment of the present invention comprises a method of providing digital content service in an inter-network conditional access system.
  • the method includes receiving encrypted digital content from at least one content provider, creating a secure channel for distribution of the encrypted digital content (a program), creating security keys for the program and sending the keys on the channel.
  • a key protects multiple digital content in the form of multiple programs of data to be distributed to a subscriber base using a cryptographic key for those programs.
  • Another embodiment of the present invention comprises a method of consuming content in an inter-network conditional access system.
  • the method includes receiving keys that were distributed on a secure channel, receiving a first key for gaining access to the secure channel, receiving a second key for decrypting the program communicated over the secure channel, the program comprising encrypted digital content, decrypting the program key on the channel using the first key, and decrypting the encrypted digital content using the second key.
  • FIG. 1 is a diagram illustrating three subsystems of an inter-network conditional access (ICA) system according to an embodiment of the present invention
  • Figure 2 is a diagram showing interfaces between a content provider (CP), a service provider (SP), and a content consumer (CC) according to the ICA system of Figure 1 ;
  • CP content provider
  • SP service provider
  • CC content consumer
  • Figure 3 is a diagram illustrating operations of a new channel function according to an embodiment of the present invention.
  • Figure 4 is a diagram illustrating operations of an add service provider channel member function according to an embodiment of the present invention.
  • Figure 5 is a diagram illustrating operations of an add content provider channel member function according to an embodiment of the present invention
  • Figure 6 is a diagram illustrating operations of a remove service provider channel member function according to an embodiment of the present invention
  • Figure 7 is a diagram illustrating operations of a remove content provider channel member function according to an embodiment of the present invention.
  • Figure 8 is a diagram illustrating operations of a new program function according to an embodiment of the present invention.
  • Figure 9 is a flow diagram illustrating an authentication/authorization operation according to an embodiment of the present invention.
  • Figure 1 0 is a flow diagram illustrating a content provider request channel operation according to an embodiment of the present invention
  • Figure 1 1 is a flow diagram illustrating a service provider request channel operation according to an embodiment of the present invention
  • Figure 1 2 is a flow diagram illustrating content provider and service provider assign channel keys operations according to an embodiment of the present invention
  • Figure 1 3 is a flow diagram illustrating a content consumer assign channel keys operation according to an embodiment of the present invention
  • Figure 1 4 is a flow diagram illustrating a service provider or content provider assign program keys operation according to an embodiment of the present invention
  • Figure 1 5 is a flow diagram illustrating a content consumer key program operation according to an embodiment of the present invention.
  • Figure 1 6 is a diagram illustrating a sample system suitable to be programmed according to an embodiment of methods of performing content provider, service provider and/or content consumer operations in accordance with the present invention.
  • An embodiment of the present invention includes a system and method for combining network security and application/content security to protect a service provider's data service and a content provider's data content in a multicast network environment.
  • An embodiment of the present invention allows security to be controlled and implemented from different locations within a network, such as at the content provider's location, at the service provider's network operations center (NOC), and at intermediate caching server systems.
  • NOC network operations center
  • conditional access may be applied to network environments supporting digital content distribution to receivers such as general purpose computer systems (e.g., personal computers (PC), and servers), although other devices such as set-top boxes, Internet appliances, digital televisions, televisions offering data services, and other data receiving devices, may also be used as content receivers.
  • digital content may be any digital data.
  • MPEG Moving Picture Experts Group
  • ISO International Standards Organization
  • digital content comprises Internet Protocol (IP) packets that are in the data services layer of an MPEG-2 transport stream.
  • IP Internet Protocol
  • Figure 1 is a diagram illustrating three subsystems of an inter-network conditional access (ICA) system according to an embodiment of the present invention.
  • a content provider (CP) 1 0 functions as a source of content.
  • the CP may be a general purpose computer system programmed for authoring or other generation and distribution of multimedia data content.
  • the CP may be any source of multimedia data, including a source of live data, such as may be received from motion picture cameras, video cameras, still cameras, and microphones, for example.
  • a content consumer (CC) 1 2 functions as a consumer or user of the content provided by the CP.
  • the CC may be a general purpose computer system (e.g., a PC or a server), set-top box, Internet appliance, consumer electronics product, digital television, a television (TV) offering data services, or other content receiving device.
  • the CP and CC may be coupled to communications networks 1 5 such as a public switched telephone network (PSTN), the Internet, local area networks (LANs), wide area networks (WANs), and other corporate intranets, and may employ various data delivery systems such as cable, satellite, fiber optic lines, modems, and broadcast antennas, for example.
  • PSTN public switched telephone network
  • LANs local area networks
  • WANs wide area networks
  • a service provider (SP) 14 functions as a distributor of the content and a provider of communications services between the CP and the CC.
  • the SP may also function as a digital broadcast system (DBS), such as a satellite network, for example.
  • DBS digital broadcast system
  • the CP of an ICA system may perform one or more of the following operations.
  • the CP encrypts digital content with at least one key, transmits the encrypted digital content to at least one service provider, and requests creation of a secure channel for distribution of the encrypted digital content by the service provider.
  • the CP also requests creation of a program to be sent on the channel (the program comprising the encrypted digital content) and installs at least one key at a content consumer for decrypting the program.
  • the SP of an ICA system may perform one or more of the following operations.
  • the SP receives encrypted digital content from at least one content provider, creates a secure channel for distribution of the encrypted digital content, creates a program for sending on the channel, and distributes the program.
  • the CC of an ICA system may perform one or more of the following operations.
  • the CC receives an announcement of program keys (which consists of at least keying material for that program such as a key and a time period for when the key is valid) to be distributed on a secure channel, receives a first key for gaining access to the secure channel, and receives a second key for decrypting the program data communicated over the secure channel.
  • the CC also receives the program on the channel, and decrypts the encrypted digital content (the program) using the second key.
  • a single CP may provide content to a single SP, which in turn provides service to one or more CCs.
  • a plurality of CPs may provide content to a single SP, which in turn provides service to one or more CCs.
  • multiple CPs may provide content to multiple SPs. These SPs then provide service to one or more CCs.
  • the ICA system may allow or disallow individual destination networks from being able to decrypt network content. This is accomplished through the distribution of keying material only to receivers that are authorized and authenticated.
  • the ICA system thereby supports encryption of network content "end-to-end" throughout the system.
  • Some CCs may additionally employ content protection through the use of a trusted agent and also a trusted viewer.
  • a trusted agent comprises system software that protects the channel key
  • a trusted viewer comprises application software that protects the program key and controls how content is accessed and used on a CC.
  • an ICA key server provides keys only to authorized and authenticated trusted viewers.
  • the ICA system comprises at least four characteristics that distinguish it from TV conditional access.
  • the ICA system supports conditional access to content stored in network packets and files and is capable of executing on general purpose computer systems.
  • the ICA system works over a variety of network types and communications devices including Ethernet connections, modems, cable modems, asynchronous digital subscriber lines (ADSL), digital video broadcasting (DVB) systems, and advanced television standards committee (ATSC) systems, for example.
  • the ICA system may operate over multiple networks, not just multiple network types. For example, inter-network conditional access may be applied to a data flow that originates on an Ethernet connection, traverses one or more networks, including the Internet, and is received on an Ethernet connection or by a modem.
  • the ICA system also uses both multicast and unicast protocols and may operate over broadcast as well as point-to- point networks.
  • a channel carries keys for programs, and a program is an address or group of addresses having one or more keys assigned to them.
  • the addresses may be unicast or multicast addresses.
  • each program may be carried out using a specific multicast address.
  • Addresses may be grouped into programs with each address in the program carrying a media stream or package.
  • a CP may provide the encryption capabilities. Encryption processing may be offloaded from a SP to a CP for purposes of allowing the CP to control content security.
  • a program may be content sent to one or more multicast addresses (e.g., a content channel) for a selected duration of time.
  • a program comprises a series of logically related packages or a stream of data sent on a channel.
  • a package comprises one or more files, which may be communicated repeatedly.
  • a stream comprises one or more data packets having a temporal relationship between the packets.
  • a program key is first announced to one or more CCs on a channel used for distributing program keys.
  • Authorization, channel and program information are kept in a database under the control of the CP or SP owner of the channel.
  • a database may be a set of data structures related to subscribers of channels and programs (e.g., CCs) and the data content they are authorized to receive.
  • the ICA system shown in Figure 1 provides service security and content security at least in part by creating trust relationships between the three subsystems. Creation of these trust relationships will be discussed below. Additionally, the system comprises three separate levels of security. First, a trusted group defined by access to a channel key allows access to a network service by application software of the content consumer (CC) that is authorized and authenticated by the owner of the service. The authorization and authentication may be of a particular computer system and/or user. Second, a member who is authorized and authenticated may gain access to a particular program key. Third, channel and program keys may be protected against access at the content consumer's computer by a trusted agent or trusted viewer that is authorized and authenticated to use specific channel and program keys without being able to directly read those keys. The use of trusted agents and trusted viewers are an optional content protection feature of the service. II. Interfaces for Access and Content Control
  • FIG 2 is a diagram showing interfaces between a content provider (CP), a service provider (SP), and a content consumer (CC) according to the ICA system of Figure 1 .
  • These interfaces may be implemented by any appropriate means, such as Internet connections, satellite transmissions, PSTN back-channels, cables, and LANs, for example, although the invention is not limited in scope in this respect.
  • One interface between a CP 1 0 and a SP 1 4 may be a request interface 20.
  • Request interface 20 may be used to request mutual authentication of the CP and the SP and to request the distribution of channel and program keys.
  • One interface between a SP 1 4 and a CC 1 2 may be a customer interface 22 where the CC may get the first key to a particular channel.
  • First customer interface 22 may be used to request authorization and authentication of the CC by the SP, to assign channel keys, to assign program keys, and to report programs.
  • One interface between a CP 1 0 and a CC 1 2 may be a second customer interface 24.
  • Second customer interface 24 may be used to request mutual authentication of the CC and CP, to assign channel keys, to assign program keys, and to report programs.
  • a first application tool interface 26 may be included in a CP 1 0 to initiate a launch of application software to control distribution of a program by the CP (e.g., such as a trusted server or player).
  • a second application tool interface 28 may be included in a CC 1 2 to initiate a launch of application software, such as a trusted viewer, for example, for receiving and rendering a program that is being sent either multicast or unicast.
  • a first database interface 30 may be included to connect CP 10 with CP database 32.
  • CP database 32 may be employed as necessary to store system data relating to channel members (e.g., users or CCs), channel keys, program keys, and authentication information (e.g., digital certificates as in a public key infrastructure (PKI), or other means).
  • a second database interface 34 may be included to connect SP 14 with SP database 36.
  • SP database 36 may be employed as necessary to store system data relating to channel members, channel keys, program keys and authentication information (e.g., digital certificates as in a public key infrastructure (PKI), or other means).
  • CC 1 2 may also be coupled by third database interface 37 to a CC database 38, for storing information relating to available channels and programs. It is well known that databases such as these support a variety of operations for updating and querying information contained in them.
  • the ICA system provides functions to accomplish a particular task. Functions comprise multiple, sequential operations across at least one of the system interfaces shown in Figure 2. In the aggregate, the functions implement network and content security in an inter-network conditional access system for multicasting digital content.
  • One embodiment of the present invention provides at least four functions: creating a channel for distribution of program keys, adding a member to the channel, removing a member from the channel, and distributing program keys on the channel.
  • One embodiment of the present invention provides at least seven operations: authenticate/authorize, request a channel be established, assign channel keys, assign program keys, report program, database update, and database select.
  • FIG. 3 is a diagram illustrating operations of a Create a Channel for Distribution of Program Keys function according to an embodiment of the present invention. This function requests an address from a SP by a CP for allocation as a channel on the SP's network.
  • a channel comprises an address for sending program keys. Keys for programs may be distributed to a particular channel address.
  • Channels may be created by a SP or a CP for the SP's network.
  • the Create a Channel for Distribution of Program Keys function may be implemented using the authenticate/authorize and request channel operations.
  • SP 14 and CP 10 authenticate 50 each other, and an authorization check is made by the SP to confirm the rights of the CP.
  • the CP then sends a request 52 to create a channel to the SP.
  • Either a SP or a CP may add a member (CC) to a channel to authorize a CC to provide a CC with a channel key and subsequently receive one or more program keys on the channel.
  • Figure 4 is a diagram illustrating operations of the Adding a Member to the Channel function according to an embodiment of the present invention. This function may be used following execution of a successful Create a Channel for Distribution of Program Keys function to add a content consumer (CC) to the channel.
  • SP database 36 may be updated 54 by specifying to SP 14 the channel members and the authorization/authentication information to be modified along with the requested modifications.
  • SP 14 and CC 1 2 authenticate 56 each other, and SP performs an authorization check to confirm that the CC has rights to become a member of the channel. If successful, the SP adds a channel member 58 by sending channel information to the CC, thereby installing the channel key at the CC at 60. The CC then receives zero or more program keys on the channel and installs them at 62.
  • Figure 5 is a diagram illustrating operations of adding a member to a channel that is owned by a CP according to an embodiment of the present invention.
  • This function may be used by the CP following execution of a successful Create Channel for Distribution of Program Keys functions to add content consumers (CCs) to the newly created channel, one at a time.
  • the SP does not have access to the unencrypted key to the channel nor to the program keys that are subsequently sent on the channel by the CP.
  • Adding a member to a channel owned by a CP may be implemented as follows. First, CP database 32 may be updated 64 by specifying to CP 1 0 the members, channel, and authorization/authentication information to be modified along with the requested modifications.
  • CP 1 0 and CC 1 2 authenticate 66 each other.
  • the CP adds a channel 68 by sending the channel key to the CC, thereby installing the channel at the CC.
  • the CP installs a channel key 70 at the CC for the new channel.
  • the CP also installs a program key 72 for zero or more programs to be received on the new channel. Additional keys may also be added for zero or more programs.
  • Either a SP or a CP may remove a member from a channel it owns.
  • Figure 6 is a diagram illustrating operations of removing a channel member from a channel owned by a SP according to an embodiment of the present invention. This function may be used by the SP to remove a CC from a channel. To accomplish this, the member's authorization (e.g., the selected CC) may be first removed from SP database 36 for this channel and then the keys for the channel may be changed for all other members of the group accessing the channel.
  • the member's authorization e.g., the selected CC
  • Removing a member from a channel function for an SP Channel may be implemented as follows. First, SP database 36 may be updated 74 by specifying to SP 1 4 the channel, member, and authorization/authentication information to be modified along with the requested modifications. Next, in one embodiment, the SP installs a new key 76 for the channel for all CCs subscribed to this channel except for the CC to be removed, thereby preventing the removed channel member from accessing the channel. In other embodiments, other well-known mechanisms for efficiently changing the keys at CC computers using multicast communications may be employed.
  • Figure 7 is a diagram illustrating operations of removing a member from a channel owned by a CP according to an embodiment of the present invention. This function may be used by the CP to remove a CC from a channel.
  • the member e.g., the selected CC
  • the keys for the channel may be changed for all other members of the group accessing the channel.
  • Database operations to reflect the change may be authenticated and may be initiated by any party that is authorized by the CP or the SP.
  • other well-known mechanisms for efficiently changing the keys at CC computers using multicast communications may be employed.
  • Removing a member from a channel for a CP channel may be implemented at the CP as follows. First, CP database 32 may be updated 78 by specifying to CP 1 0 the members, channels, and authorization/authentication information to be modified along with the requested modifications. Next, in one embodiment, the CP may install a new key 80 for the channel for the channel for all CCs subscribed to this channel except for the CC to be removed, thereby preventing the removed channel member from accessing the channel. In other embodiments, other well-known mechanisms for efficiently changing the keys at CC computers using multicast communications may be employed.
  • FIG. 8 is a diagram illustrating operations of a distributing program keys on a channel function according to an embodiment of the present invention. This function may be used in the ICA system to securely distribute program keys over a multicast network.
  • the distribute program keys function may be implemented as follows. First, CP database 32 may be updated 80 by specifying to CP 1 0 the program-specific information such as channel, start time, and stop time to be modified along with the requested modifications. Alternatively, SP database 36 may be updated by SP 14 with this information. Next, CP 1 0 and SP 14 authenticate 82 each other, and an authorization check is performed for the CP by the SP. The CP requests one or more program keys be sent on a channel from the SP by a distribute program keys on a channel 84 operation from the SP. The SP distributes the program key or keys 86 to CC 1 2. The CC then installs keys 88 for the decrypting program on the CC.
  • the CC reports the program 90 by informing a billing system (not shown) at the CP or the SP that the program key or keys are being used and optionally that the content is being received, decrypted and viewed.
  • new programs may be reported to a billing system or subscription system included in the CP or SP.
  • the communication from the CC to the CP or the SP may take place over a back channel (not shown).
  • One embodiment of the present invention provides at least seven operations to implement the system functions described above: authenticate/authorize, request channel, assign channel keys, assign program keys, report program, database update, and database select.
  • IPSec Internet Protocol Security
  • ITU International Telecommunications Union
  • PKI Public Key Infrastructure
  • both parties such as Content Provider (CP) and Service Provider (SP), CP and Content Consumer (CC), or SP and CC, mutually authenticate each other at the start of a communications or information exchange session.
  • CP Content Provider
  • SP Service Provider
  • CC Content Consumer
  • SP and CC mutually authenticate each other at the start of a communications or information exchange session.
  • One-way authentication there is no back-channel from one destination to the other as in many geosynchronous satellite communications arrangements.
  • One way authentication may be used in embodiments of the present invention through such means as "pre-shared" keys.
  • CP database 32 or CP database 36 may contain a shared secret key or a public key of a CC and data sent to the CC may be encrypted with this shared secret key or public key with the knowledge that only the CC who owns the corresponding secret key or private key portion of the public/private key pair will be able to decrypt the data.
  • the data may also be encrypted with the private key of the SP or CP and sent to the CC who has the corresponding public key of the public/private key pair of the sender (e.g., either the SP or the CP).
  • the receiver will only be able to decrypt data sent by the particular sender. This may be used to avoid impersonation of the sender.
  • the data that may be sent to the receiver may include a session key for a particular network stream of packets or a package of files that are being sent.
  • Authentication may be of two varieties, user authentication or platform authentication.
  • user authentication is when a person logs into a system using a password or even biometric data. The user may log in from different devices and be authenticated as a known user with known access rights to the system.
  • platform authentication is when a particular platform is authenticated using hardware and/or software features such as a unique identifier on a computer processor or a globally unique identifier on a version of the operating system that runs on the platform (such as a PC), or by a certificate, such as an X.509 certificate.
  • a caller-ID is a means of identifying an endpoint of a phone call, but the use of caller-ID does not identify which particular person is using the phone.
  • a dongle On a general purpose computer such as a PC, however, there are various means for uniquely identifying the particular computer, such as processor identifier, or by various other means that are collectively referred to as a "dongle. " When the platform is authenticated by means of a dongle, then some assurance is given that the platform serving as the source or receiver of data is the platform that is authorized to receive the data.
  • an authentication technique such as asymmetric public key cryptography (e.g., RSA or Diffie-Hellman) as described in various methods above may be used to encrypt or decrypt data that comprises a channel key.
  • this channel key is used to encrypt zero or more program keys.
  • the channel key is called the Key Encrypting Key (KEK).
  • the sender of the KEK has assurances that only an authenticated and authorized receiver can decrypt it and the receiver of a KEK can be assured that only an authenticated and authorized sender may have encrypted it.
  • the KEK may encrypt a symmetric key that is used to encrypt program keys called traffic encrypting keys (TEKs) .
  • TKIs traffic encrypting keys
  • the TEKs may be used to encrypt data (e.g., program keys and program data) such as network packets that are sent to a group of one or more receivers.
  • data e.g., program keys and program data
  • the KEKs and TEKs may form a tree with a KEK corresponding to a subtree of receivers and TEKs corresponding to packet transmissions sent to receivers.
  • FIG. 9 is a flow diagram illustrating an authentication/authorization operation according to an embodiment of the present invention.
  • a connection may be established between a two-party subset of the CP, SP or CC.
  • authentication may be performed using one of the methods described above. If authentication is successful at block 1 04, then the appropriate database is checked at block 1 05 to determine if the authenticated entity is authorized for the particular access. If authentication and authorization succeed at block 1 05, processing may performed, such as the transmission and/or the reception of data following the report of success shown in block 1 06. The error path of this processing occurs when the authentication/authorization operations of blocks 1 02 and 1 05 were not evaluated to be successful. This occurs when one of the parties did not successfully authenticate itself to the other or if the requesting entity was not authorized for the particular access. An authentication/authorization error may be processed in block 1 08, and in all cases, processing ceases at block 1 10.
  • authentication may occur at the session level, such as at the commencement of communications and prior to the exchange of data among communicating endpoints, or it may occur at the packet level, where each packet is authenticated.
  • session level such as at the commencement of communications and prior to the exchange of data among communicating endpoints
  • packet level where each packet is authenticated.
  • the fact that the two endpoints share a secret key that is used for encrypting packets is implicit packet-level authentication since neither endpoint may impersonate the other.
  • the situation becomes more complicated because any one of the endpoints may impersonate the sender when a symmetric key is used.
  • Embodiments of the present invention may employ of any of these means.
  • the request channel operation obtains a multicast address from a SP's multicast address space for access to the SP's network.
  • the request may result in a success or a failure.
  • a failure may result when there are no more addresses to assign, for example.
  • the request channel operation may be initiated as database operations performed against tables stored within the SP database and/or the CP database.
  • a database update attempt may trigger an address allocation request. The outcome of this request determines the success or failure of the operation.
  • a new channel record may be added to the database. Results of the request channel may need to be kept consistent with the SP and CP databases.
  • Figure 1 0 is a flow diagram illustrating a content provider request channel operation according to an embodiment of the present invention.
  • a request may be made by the CP to the SP to get address parameters.
  • a requested address range may be one parameter of the request; additional request parameters may include the duration of time that the address will be used for the channel.
  • the address may be obtained from the SP at block 1 24.
  • An example of an invalid parameter is a specification of a time duration or address range that cannot be satisfied. Otherwise, a new request to get address parameters from the SP is made again at block 1 20. If the request is successful at block 1 26, then processing ends at block 1 28. If the SP fails to successfully obtain a channel, the error may be processed at block 1 30.
  • Figure 1 1 is a flow diagram illustrating a service provider request channel operation according to an embodiment of the present invention.
  • the SP may wait for new channel requests.
  • a request is received from a CP at block 1 40
  • the request may be analyzed to determine its validity. If the request is valid at block 1 42, a multicast address may be allocated according to the request's parameters at block 1 44. If the request is invalid at block 1 42, the error may be processed at block 146 by reporting the error and returning to a wait state until the next CP request is received. An attempt may be made to allocate the address from a local or a hierarchical multicast address allocation server. If the attempt is unsuccessful at block 1 48, the error may be processed at block 1 46.
  • an update to a channel database may occur at block 1 50 as a transaction against all copies of database tuples for the channel at the SP database and the CP database.
  • the success of the request may be reported to the requesting CP.
  • SP request channel process then completes at block 1 54.
  • the assign channel keys operation installs a channel key for a content consumer (CC).
  • a channel is a multicast address and a key for encrypting program keys that are sent to the channel address.
  • a channel may carry one or more program keys encrypted with the channel key, and a program may be decrypted by a traffic encryption key (TEK).
  • TAK traffic encryption key
  • Information about channels may be represented as table entries in a subscriber database at the SP or the CP.
  • Figure 1 2 is a flow diagram illustrating content provider (CP) and service provider (SP) assign channel keys operations according to an embodiment of the present invention.
  • a CP or SP adds a member to a channel by giving an address for the channel and the channel keys to the channel member following an authentication/authorization step.
  • the key may be distributed to a channel member via unicast on a per channel member basis.
  • the channel key is used to encrypt program keys that are sent to the channel address.
  • the channel key may be communicated to the channel member by sending it directly to the channel member, by transmission on a unidirectional network such as a broadcast network, or may be distributed via a web request from the new channel member.
  • a channel may use a trusted agent to prevent unauthorized copying of keys or agent software.
  • a trusted agent protects the SP's keys using tamper-resistant techniques that prevent access to the keying material by application software other than the agent software that is authorized to use the key.
  • a channel member is a CC who gets notice of the existence of a channel when it receives the address and is assigned keys for it.
  • a database update may be performed after an assign channel keys operation is completed and the member is successfully added to the channel.
  • an assign channel keys request may be obtained.
  • the requesting member may be authenticated/authorized at block 1 64.
  • the member may be given keys to the channel at block 1 68.
  • the assign program keys operation succeeded, then the member was successfully added at block 1 70, the CP database (for CP processing) or the SP database (for SP processing) may be updated at block 1 72 to reflect the addition of the member to the channel. Processing is then complete at block 1 74. If an error is detected at blocks 1 62, 1 66, or 1 70, the error may be processed at block 1 76.
  • Figure 1 3 is a flow diagram illustrating a content consumer (CC) assign channel keys operation according to an embodiment of the present invention. If a CC is the target of the assign channel keys request (that is, a channel is being added to the channels accessible by this CC), then the processing shown in Figure 1 3 may be performed at the CC.
  • an assign channel keys request may be received from a SP or a CP. If the request is for this particular CC at block 1 82, the provider (either a CP or a SP) may be authenticated/authorized at block 1 84. If the authentication/authorization is successful at 1 86, the channel keys may be assigned and installed for use by the CC at block 1 88.
  • a trusted agent may be installed on the content consumer (CC).
  • the trusted agent handles the channel keys for the CC, and an SP or CP authenticates the trusted agent before providing a channel key to the CC.
  • the CC will also authenticate the SP or CP and will only proceed if the SP or CP is authenticated. If the key assignment was successful at block 1 90, the CC monitors program keying material for the channel at block 1 92. Processing is then complete at block 1 94. If an error is detected at block 1 82, 1 86, or 1 90, the error may be processed at block 1 96.
  • the assign program keys operation installs keys for a program.
  • the key may be for a single address or multiple addresses.
  • a program uses one or more keys to encrypt its data packet traffic.
  • a program may require a trusted viewer for accessing the encrypted content that will protect the key and content from unauthorized use.
  • the program key may be a tamper-resistant module.
  • Figure 1 4 is a flow diagram illustrating a service provider or content provider assign program keys operation according to an embodiment of the present invention.
  • a key request may be obtained by the SP or the CP to send program keys on a channel.
  • a key request may be for a new set of program keys for an announcement, streams or package program, or to refresh the keys of a program to exclude certain members that have been removed from the channel.
  • If the request is valid at block 302, one or more program keys may be generated at block 304. If the request is invalid at block 302, the error may be processed at block 306 and processing ends at block 308.
  • An invalid request may be to assign keys or refresh the keys of a non-existing program or to remove a non-existent member from a channel.
  • the generated key may be sent to a channel member. Key distribution may be done on a sub-tree basis using multicast or on a single member basis. If more program keys are to distributed at block 31 2, then assign program keys processing continues with the next member at block 31 0. Otherwise, at block 31 4, the SP database may be updated for SP assign program keys processing, or the CP database may be updated for CP assign program keys processing. The distributed database update reflects the new system state existing after the end of successful assign program keys processing. SP or CP assign program keys processing ends at block 308.
  • FIG. 1 5 is a flow diagram illustrating a content consumer assign program keys operation according to an embodiment of the present invention.
  • a trusted viewer may be installed at block 322.
  • a trusted viewer may be associated with a program.
  • an assign program keys request may be obtained.
  • the request to assign keys to a program may be sent to a CC by a SP or CP either unicast or multicast.
  • the assign program keys message may be received by a CC that is being removed as a channel member and thus that CC will not be able to decrypt the program key.
  • Program keys may be assigned on a sub-tree basis using multicast or on a single member basis.
  • one or more program keys may be updated at block 328.
  • Program keys may be updated by refreshing the TEKs that are associated with the program. Otherwise, a new assign program keys request may again be obtained at block 324.
  • the report program operation communicates when a CC joins or is receiving a program to a SP or a CP.
  • An update of the SP database or the CP database occurs after receipt of the report.
  • Parameters for the report may be obtained from an announcement, from a program key or channel key module, or may be viewer-specific.
  • the report program message may be multicast or unicast. Implementation of the report program operation does not assume tethered consumption of content, and the report may be web based or updated periodically. Additionally, in one embodiment, a back channel interface may be used to convey the report information to either the SP database or the CP database.
  • the ICA system may be used in one embodiment as follows.
  • a channel may be created, at least one user may be added, and keys to a channel may be requested and distributed.
  • program keys can be sent to the members, whereby the program keys are encrypted in the channel key and sent to the channel address.
  • Embodiments of the present invention accommodate various mechanisms for announcing, publicizing, notifying, sending and receiving program information such as distribution of digital information over packet networks. Besides adding users (which may be authenticated people or authenticated platforms), other operations may be used for removing users from the channel.
  • the operations of adding or removing users, who are CC members of a channel may be triggered by and may result in updates to a database management system operating at a SP or a CP.
  • a CC is removed from the channel, it may be necessary to change the channel key of all remaining CC members by assigning a new channel key to them.
  • a channel may be created by either the SP or the CP.
  • the user, the platform, or the computer software that causes a channel to be created may be authenticated.
  • a database record may be created that includes information such as a channel name, a channel network address, channel policy information (e.g., identification of cryptographic algorithm, modes, key lengths, who may join the channel, etc.), and a CP or SP channel owner.
  • a CC (platform or user) may be added to a channel through user intervention or as a result of an update to a database at the SP or CP.
  • the CC may be an authenticated platform or authenticated person.
  • a database record may be created that includes information such as a CC name, a CC credentials, and other information.
  • a CC receives a key to the channel upon being added to the ICA system. This channel key encrypts program keys, as described above.
  • Each program may have its own traffic encryption key and even its own channel in a 'pay per view' embodiment. Alternatively, each channel may be used to carry keys for multiple programs as in a subscriber embodiment.
  • a group of content consumers may receive multicast content that is 'pushed' to users as in Internet Protocol (IP) multicast networks.
  • IP Internet Protocol
  • multicast distribution of channel and program keys complements the multicast nature of the digital content distribution.
  • individual users may request digital content be delivered directly to them in a unicast embodiment of the present invention. If the digital content is delivered unicast to the CC, such as on networks that do not support multicast operation, then the keying material may also be requested and received unicast, such as channel and program keys that are 'pulled' to the CC by a web browser application.
  • the keying material may also be requested and received unicast, such as channel and program keys that are 'pulled' to the CC by a web browser application.
  • the CP database may be updated when the CP maintains the security associations (SAs) for the program as, for example, when a company is sending proprietary information to its offices using a network service provider and the program in question is not to be shared with the network service provider (SP).
  • SAs security associations
  • SP network service provider
  • Members may need to be removed from a channel when, for example, their subscription expires to channel content. This operation may be accomplished by multicast or unicast distribution of new channel keys to the remaining members of the channel.
  • multicast there are efficient means of distributing keys to large numbers of channel members that are logarithmic in complexity and which do not require unicast exchanges between the key management center in the CP or SP and individual members.
  • Those skilled in the art of multicast networking will recognize that a user may be added or removed from a channel with logarithmic message, storage and processing complexity when a tree or hierarchical structure is used.
  • Embodiments of the present invention use hierarchical data structures for managing keys to change the keys of members after a member is removed from a channel or before a new member is added to the channel.
  • the removal of a user may be accompanied by an update the database system in the CP or the SP to remove any association with the user and the channel or program.
  • Embodiments of the present invention may be implemented in hardware or software, or a combination of both. However, embodiments of the invention may be implemented as computer software executing on programmable systems comprising at least one processor, a data storage system (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device.
  • SPs service providers
  • CPs content providers
  • CCs content consumers
  • SPs service providers
  • Programmable software may be applied to input data to perform the functions described herein and generate output information. The output information may be applied to one or more output devices, in known fashion.
  • a processing system includes any system that has a processor, such as, for example, a digital signal processor (DSP), a microcontroller, an application specific integrated circuit (ASIC), or a microprocessor.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • the programs may be implemented in a high level procedural or object oriented programming language to communicate with a processing system.
  • the programs may also be implemented in assembly or machine language, if desired. In fact, the invention is not limited in scope to any particular programming language. In any case, the language may be a compiled or interpreted language.
  • the programs may be stored on a storage media or device (e.g., hard disk drive, floppy disk drive, read only memory (ROM), CD-ROM device, flash memory device, digital versatile disk (DVD), or other storage device) readable by a general or special purpose programmable processing system, for configuring and operating the processing system when the storage media or device is read by the processing system to perform the procedures described herein.
  • Embodiments of the invention may also be considered to be implemented as a machine-readable storage medium, configured for use with a processing system, where the storage medium so configured causes the processing system to operate in a specific and predefined manner to perform the functions described herein.
  • Sample system 400 may be used, for example, to execute the processing for methods employed by the content provider, service provider, or content consumer, in accordance with the present invention, such as the embodiment described herein.
  • Sample system 400 is representative of processing systems based on the PENTIUM®, PENTIUM® Pro, PENTIUM® II, PENTIUM® III, and CELERONTM microprocessors available from Intel Corporation, although other systems (including personal computers (PCs) having other microprocessors, engineering workstations, set-top boxes and the like) may also be used.
  • sample system 400 may be executing a version of the WINDOWSTM operating system available from Microsoft Corporation, although other operating systems and graphical user interfaces, for example, may also be used.
  • FIG. 1 6 is a block diagram of a system 400 of one embodiment of the present invention.
  • the computer system 400 includes a processor 402 that processes data signals.
  • the processor 402 may be a complex instruction set computer (CISC) microprocessor, a reduced instruction set computing (RISC) microprocessor, a very long instruction word (VLIW) microprocessor, a processor implementing a combination of instruction sets, or other processor device, such as a digital signal processor, for example.
  • Figure 1 6 shows an example of an embodiment of the present invention implemented as a single processor system 400. However, it is understood that embodiments of the present invention may alternatively be implemented as systems having multiple processors.
  • Processor 402 may be coupled to a processor bus 404 that transmits data signals between processor 402 and other components in the system 400.
  • System 400 includes a memory 406.
  • Memory 406 may be a dynamic random access memory (DRAM) device, a static random access memory (SRAM) device, or other memory device.
  • Memory 406 may store instructions and/or data represented by data signals that may be executed by processor 402. The instructions and/or data may comprise code for performing any and/or all of the techniques of the present invention.
  • Memory 406 may also contain additional software and/or data (not shown).
  • a cache memory 408 may reside inside processor 402 that stores data signals stored in memory 406. Cache memory 408 in this embodiment speeds up memory accesses by the processor by taking advantage of its locality of access. Alternatively, in another embodiment, the cache memory may reside external to the processor.
  • a bridge/memory controller 41 0 may be coupled to the processor bus 404 and memory 406.
  • the bridge/memory controller 41 0 directs data signals between processor 402, memory 406, and other components in the system 400 and bridges the data signals between processor bus 404, memory 406, and a first input/output (I/O) bus 41 2.
  • the bridge/memory controller provides a graphics port for coupling to a graphics controller 41 3.
  • graphics controller 41 3 interfaces to a display device (not shown) for displaying images rendered or otherwise processed by the graphics controller 41 3 to a user.
  • First I/O bus 41 2 may comprise a single bus or a combination of multiple buses. First I/O bus 41 2 provides communication links between components in system 400.
  • a network controller 41 4 may be coupled to the first I/O bus 41 2.
  • the network controller links system 400 to a network that may include a plurality of processing systems (not shown in Figure 1 6) and supports communication among various systems.
  • the network of processing systems may comprise a local area network (LAN), a wide area network (WAN), the Internet, or other network.
  • a display device controller 41 6 may be coupled to the first I/O bus 41 2.
  • the display device controller 41 6 allows coupling of a display device to system 400 and acts as an interface between a display device (not shown) and the system.
  • the display device may comprise a television set, a computer monitor, a flat panel display, or other suitable display device.
  • the display device receives data signals from processor 402 through display device controller 41 6 and displays information contained in the data signals to a user of system 400.
  • camera 41 8 may be coupled to the first I/O bus to capture live events.
  • Camera 418 may comprise a digital video camera having internal digital video capture hardware that translates a captured image into digital graphical data.
  • the camera may comprise an analog video camera having digital video capture hardware external to the video camera for digitizing a captured image.
  • camera 41 8 may comprise a digital still camera or an analog still camera coupled to image capture hardware.
  • a second I/O bus 420 may comprise a single bus or a combination of multiple buses.
  • the second I/O bus 420 provides communication links between components in system 400.
  • a data storage device 422 may be coupled to the second I/O bus 420.
  • the data storage device 422 may comprise a hard disk drive, a floppy disk drive, a CD-ROM device, a flash memory device, or other mass storage device.
  • Data storage device 422 may comprise one or a plurality of the described data storage devices.
  • a keyboard interface 424 may be coupled to the second I/O bus 420.
  • Keyboard interface 424 may comprise a keyboard controller or other keyboard interface device.
  • Keyboard interface 424 may comprise a dedicated device or may reside in another device such as a bus controller or other controller device.
  • Keyboard interface 424 allows coupling of a keyboard to system 400 and transmits data signals from a keyboard to system 400.
  • a user input interface 425 may be coupled to the second I/O bus 420.
  • the user input interface may be coupled to a user input device, such as a mouse, joystick, or trackball, for example, to provide input data to the computer system.
  • Audio controller 426 may be coupled to the second I/O bus 420. Audio controller 426 operates to coordinate the recording and playback of audio signals.
  • a bus bridge 428 couples first I/O bridge 41 2 to second I/O bridge 420. The bus bridge operates to buffer and bridge data signals between the first I/O bus 41 2 and the second I/O bus 420.
  • Embodiments of the present invention are related to the use of the system 400 to provide a portion of an inter-network conditional access system.
  • provision of content provider, service provider, and/or content consumer operations may be performed by the system 400 in response to processor 402 executing sequences of instructions in memory 404.
  • Such instructions may be read into memory 404 from another computer-readable medium, such as data storage device 422, or from another source via the network controller 414, for example.
  • Execution of the sequences of instructions causes processor 402 to perform content provider, service provider, and/or content consumer operations according to embodiments of the present invention.
  • hardware circuitry may be used in place of or in combination with software instructions to implement embodiments of the present invention.
  • the present invention is not limited to any specific combination of hardware circuitry and software.
  • data storage device 422 may be used to provide long-term storage for the executable instructions and data structures for embodiments of methods of performing content provider, service provider, and/or content consumer operations in accordance with the present invention
  • memory 406 is used to store on a shorter term basis the executable instructions of embodiments of the methods for performing content provider, service provider, and/or content consumer operations in accordance with the present invention during execution by processor 402.

Abstract

An inter-network conditional access system unifies network security and application/content security in a single system to protect a service provider's service and to secure a content provider's content in a multicast network environment. The system includes at least one content provider to provide digital content, and at least one service provider to securely receive the digital content from the at least one content provider and to securely distribute the digital content. The content provider and the service provider may create a relationship of trust between themselves. The system also includes at least one content consumer to securely receive the digital content from the at least one service provider and to securely consume the digital content. The content consumer and the service provider also may create a relationship of trust between themselves.

Description

SYSTEM AND METHOD FOR SECURELY DISTRIBUTING CONTENT TO GROUPS OF RECEIVERS
BACKGROUND
1. FIELD
The present invention relates generally to data communications and, more specifically, to protection of digital content distributed over a multicast network.
2. DESCRIPTION
Conditional access controls are sometimes used by television (TV) networks where content (e.g., subscriptions to packages of channels) is sold to customers. Conditional access controls permit individual, authorized receivers to receive selected content on a broadcast network, while denying access to the content to unauthorized receivers. TV networks may be analog or digital and there are at least several conditional access control mechanisms available for each type of service. Conditional access controls provide at least two common functions. First, conditional access controls protect the operator of a broadcast network from theft of content by non- paying or other unauthorized customers. This function is important for home TV systems. Second, many conditional access controls use encryption to prevent theft of service. Conditional access controls have been promoted as a security solution for customers of business TV networks who are sensitive to having their business content disseminated unprotected over broadcast networks (such as satellite networks, for example).
Since digital TV content may also include data content, which may have a much higher value than traditional analog content (because original content can be retransmitted without any loss of information), and the same digital content may be distributed to selected groups of customers using multicast or unicast protocols for either data streams or files, additional functions for conditional access controls are desired to ensure that distributed digital content is protected against theft at the destinations to deter unauthorized copying and reuse of high-value data content.
Securing content that is multicast to a large group of customers may be accomplished through the use of symmetric key cryptography, asymmetric key cryptography, or both (e.g., a hybrid approach). One approach is to use public key cryptography for authentication of the receiver prior to multicast distribution of the data, and to use a symmetric key to encrypt the multicast content. Once the receiver is authenticated, the receiver is given the symmetric key to decrypt the content.
One security limitation with this approach is that if one of the authorized receivers decides to share the symmetric key with unauthorized receivers, the unauthorized receivers may be able to receive the multicast content. The risks associated with this problem increase when there are a very large number of authorized receivers, because there are more receivers who can violate the trust of the arrangement and distribute the key to unauthorized receivers. For example, when the multicast content is distributed by satellite, if one of the authorized receivers decides to redistribute the key used for decryption, access to the content may become unlimited. Thus, if the receiver is authorized to receive the content, but is not trusted with the keys to that content, the keys may be protected through various known tamper resistant methods embedded in a trusted viewer application. This scheme complements communications security by protecting the keys used for communications security.
Hence, a mechanism combining communication security with content protection in a system is desired to protect multicast content both during transmission and upon reception within a broadcast or multicast network. SUMMARY
An embodiment of the present invention comprises an inter-network conditional access system for digital content. The system includes at least one content provider to provide digital content, and at least one service provider, communicatively coupled to at least one content provider, to securely receive the digital content from at least one content provider and to securely distribute the digital content. The content provider and the service provider may create a relationship of trust between themselves in one embodiment.
Another embodiment of the present invention comprises a method of providing digital content in an inter-network conditional access system. The method includes encrypting digital content with at least one key, transmitting the encrypted digital content to at least one service provider, requesting creation of a secure channel for distribution of the encrypted digital content by at least one service provider, requesting creation of a program of data to be sent on the channel, the program comprising the encrypted digital content, and installing the at least one key at a content consumer for decrypting the program.
Another embodiment of the present invention comprises a method of providing digital content service in an inter-network conditional access system. The method includes receiving encrypted digital content from at least one content provider, creating a secure channel for distribution of the encrypted digital content (a program), creating security keys for the program and sending the keys on the channel. In this embodiment, a key protects multiple digital content in the form of multiple programs of data to be distributed to a subscriber base using a cryptographic key for those programs. Another embodiment of the present invention comprises a method of consuming content in an inter-network conditional access system. The method includes receiving keys that were distributed on a secure channel, receiving a first key for gaining access to the secure channel, receiving a second key for decrypting the program communicated over the secure channel, the program comprising encrypted digital content, decrypting the program key on the channel using the first key, and decrypting the encrypted digital content using the second key.
BRIEF DESCRIPTION OF THE DRAWINGS
The features and advantages of the present invention will become apparent from the following detailed description of the present invention in which:
Figure 1 is a diagram illustrating three subsystems of an inter-network conditional access (ICA) system according to an embodiment of the present invention;
Figure 2 is a diagram showing interfaces between a content provider (CP), a service provider (SP), and a content consumer (CC) according to the ICA system of Figure 1 ;
Figure 3 is a diagram illustrating operations of a new channel function according to an embodiment of the present invention;
Figure 4 is a diagram illustrating operations of an add service provider channel member function according to an embodiment of the present invention;
Figure 5 is a diagram illustrating operations of an add content provider channel member function according to an embodiment of the present invention; Figure 6 is a diagram illustrating operations of a remove service provider channel member function according to an embodiment of the present invention;
Figure 7 is a diagram illustrating operations of a remove content provider channel member function according to an embodiment of the present invention;
Figure 8 is a diagram illustrating operations of a new program function according to an embodiment of the present invention;
Figure 9 is a flow diagram illustrating an authentication/authorization operation according to an embodiment of the present invention;
Figure 1 0 is a flow diagram illustrating a content provider request channel operation according to an embodiment of the present invention;
Figure 1 1 is a flow diagram illustrating a service provider request channel operation according to an embodiment of the present invention;
Figure 1 2 is a flow diagram illustrating content provider and service provider assign channel keys operations according to an embodiment of the present invention;
Figure 1 3 is a flow diagram illustrating a content consumer assign channel keys operation according to an embodiment of the present invention;
Figure 1 4 is a flow diagram illustrating a service provider or content provider assign program keys operation according to an embodiment of the present invention;
Figure 1 5 is a flow diagram illustrating a content consumer key program operation according to an embodiment of the present invention; and
Figure 1 6 is a diagram illustrating a sample system suitable to be programmed according to an embodiment of methods of performing content provider, service provider and/or content consumer operations in accordance with the present invention. DETAILED DESCRIPTION
In the following description, for purposes of explanation, specific numbers, materials, and configurations are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one skilled in the art that the present invention may be practiced without the specific details. In other instances, well-known features are omitted or simplified in order not to obscure the present invention. Furthermore, for ease of understanding, certain method steps are delineated as separate blocks, however, those skilled in the art will appreciate that such separately delineated blocks should not be construed as necessarily conferring an order dependency in their performance. Reference in the specification to "one embodiment" or "an embodiment" of the present invention means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrase "in one embodiment" appearing in various places throughout the specification are not necessarily all referring to the same embodiment.
L System Overview and Definitions
An embodiment of the present invention includes a system and method for combining network security and application/content security to protect a service provider's data service and a content provider's data content in a multicast network environment. An embodiment of the present invention allows security to be controlled and implemented from different locations within a network, such as at the content provider's location, at the service provider's network operations center (NOC), and at intermediate caching server systems.
In embodiments of the present invention, conditional access may be applied to network environments supporting digital content distribution to receivers such as general purpose computer systems (e.g., personal computers (PC), and servers), although other devices such as set-top boxes, Internet appliances, digital televisions, televisions offering data services, and other data receiving devices, may also be used as content receivers. Generally, digital content may be any digital data. In one embodiment using data formatted according to the Moving Picture Experts Group (MPEG) 2 standard (International Standards Organization (ISO) IS-1 381 8), digital content comprises Internet Protocol (IP) packets that are in the data services layer of an MPEG-2 transport stream. Figure 1 is a diagram illustrating three subsystems of an inter-network conditional access (ICA) system according to an embodiment of the present invention. A content provider (CP) 1 0 functions as a source of content. The CP may be a general purpose computer system programmed for authoring or other generation and distribution of multimedia data content. Alternatively, the CP may be any source of multimedia data, including a source of live data, such as may be received from motion picture cameras, video cameras, still cameras, and microphones, for example. A content consumer (CC) 1 2 functions as a consumer or user of the content provided by the CP. The CC may be a general purpose computer system (e.g., a PC or a server), set-top box, Internet appliance, consumer electronics product, digital television, a television (TV) offering data services, or other content receiving device. The CP and CC may be coupled to communications networks 1 5 such as a public switched telephone network (PSTN), the Internet, local area networks (LANs), wide area networks (WANs), and other corporate intranets, and may employ various data delivery systems such as cable, satellite, fiber optic lines, modems, and broadcast antennas, for example. A service provider (SP) 14 functions as a distributor of the content and a provider of communications services between the CP and the CC. In one embodiment, the SP may also function as a digital broadcast system (DBS), such as a satellite network, for example.
In one or more embodiments of the present invention, the CP of an ICA system may perform one or more of the following operations. The CP encrypts digital content with at least one key, transmits the encrypted digital content to at least one service provider, and requests creation of a secure channel for distribution of the encrypted digital content by the service provider. The CP also requests creation of a program to be sent on the channel (the program comprising the encrypted digital content) and installs at least one key at a content consumer for decrypting the program.
The SP of an ICA system according to embodiments of the present invention may perform one or more of the following operations. The SP receives encrypted digital content from at least one content provider, creates a secure channel for distribution of the encrypted digital content, creates a program for sending on the channel, and distributes the program.
The CC of an ICA system according to embodiments of the present invention may perform one or more of the following operations. The CC receives an announcement of program keys (which consists of at least keying material for that program such as a key and a time period for when the key is valid) to be distributed on a secure channel, receives a first key for gaining access to the secure channel, and receives a second key for decrypting the program data communicated over the secure channel. The CC also receives the program on the channel, and decrypts the encrypted digital content (the program) using the second key.
In any given ICA system, there may be multiple CPs, SPs, and CCs, in any combination. In one example, a single CP may provide content to a single SP, which in turn provides service to one or more CCs. In another example, a plurality of CPs may provide content to a single SP, which in turn provides service to one or more CCs. In yet another example, multiple CPs may provide content to multiple SPs. These SPs then provide service to one or more CCs.
This system may be employed in a variety of applications that distribute digital content such as multimedia streams to large numbers of receivers and provides a number of security features. The ICA system may allow or disallow individual destination networks from being able to decrypt network content. This is accomplished through the distribution of keying material only to receivers that are authorized and authenticated. The ICA system thereby supports encryption of network content "end-to-end" throughout the system. Some CCs may additionally employ content protection through the use of a trusted agent and also a trusted viewer. A trusted agent comprises system software that protects the channel key, and a trusted viewer comprises application software that protects the program key and controls how content is accessed and used on a CC. In the content- protection scenario, an ICA key server provides keys only to authorized and authenticated trusted viewers.
The ICA system comprises at least four characteristics that distinguish it from TV conditional access. First, the ICA system supports conditional access to content stored in network packets and files and is capable of executing on general purpose computer systems. Second, the ICA system works over a variety of network types and communications devices including Ethernet connections, modems, cable modems, asynchronous digital subscriber lines (ADSL), digital video broadcasting (DVB) systems, and advanced television standards committee (ATSC) systems, for example. Third, the ICA system may operate over multiple networks, not just multiple network types. For example, inter-network conditional access may be applied to a data flow that originates on an Ethernet connection, traverses one or more networks, including the Internet, and is received on an Ethernet connection or by a modem. Fourth, the ICA system also uses both multicast and unicast protocols and may operate over broadcast as well as point-to- point networks.
Definition of various terms used herein may be useful for understanding embodiments of the present invention. A channel carries keys for programs, and a program is an address or group of addresses having one or more keys assigned to them. The addresses may be unicast or multicast addresses. In one embodiment, each program may be carried out using a specific multicast address. Addresses may be grouped into programs with each address in the program carrying a media stream or package. For a particular program or set of programs, a CP may provide the encryption capabilities. Encryption processing may be offloaded from a SP to a CP for purposes of allowing the CP to control content security. A program may be content sent to one or more multicast addresses (e.g., a content channel) for a selected duration of time. A program comprises a series of logically related packages or a stream of data sent on a channel. A package comprises one or more files, which may be communicated repeatedly. A stream comprises one or more data packets having a temporal relationship between the packets. A program key is first announced to one or more CCs on a channel used for distributing program keys. Authorization, channel and program information are kept in a database under the control of the CP or SP owner of the channel. A database may be a set of data structures related to subscribers of channels and programs (e.g., CCs) and the data content they are authorized to receive.
The ICA system shown in Figure 1 provides service security and content security at least in part by creating trust relationships between the three subsystems. Creation of these trust relationships will be discussed below. Additionally, the system comprises three separate levels of security. First, a trusted group defined by access to a channel key allows access to a network service by application software of the content consumer (CC) that is authorized and authenticated by the owner of the service. The authorization and authentication may be of a particular computer system and/or user. Second, a member who is authorized and authenticated may gain access to a particular program key. Third, channel and program keys may be protected against access at the content consumer's computer by a trusted agent or trusted viewer that is authorized and authenticated to use specific channel and program keys without being able to directly read those keys. The use of trusted agents and trusted viewers are an optional content protection feature of the service. II. Interfaces for Access and Content Control
Figure 2 is a diagram showing interfaces between a content provider (CP), a service provider (SP), and a content consumer (CC) according to the ICA system of Figure 1 . These interfaces may be implemented by any appropriate means, such as Internet connections, satellite transmissions, PSTN back-channels, cables, and LANs, for example, although the invention is not limited in scope in this respect. One interface between a CP 1 0 and a SP 1 4 may be a request interface 20. Request interface 20 may be used to request mutual authentication of the CP and the SP and to request the distribution of channel and program keys. One interface between a SP 1 4 and a CC 1 2 may be a customer interface 22 where the CC may get the first key to a particular channel. First customer interface 22 may be used to request authorization and authentication of the CC by the SP, to assign channel keys, to assign program keys, and to report programs. One interface between a CP 1 0 and a CC 1 2 may be a second customer interface 24. Second customer interface 24 may be used to request mutual authentication of the CC and CP, to assign channel keys, to assign program keys, and to report programs. A first application tool interface 26 may be included in a CP 1 0 to initiate a launch of application software to control distribution of a program by the CP (e.g., such as a trusted server or player). A second application tool interface 28 may be included in a CC 1 2 to initiate a launch of application software, such as a trusted viewer, for example, for receiving and rendering a program that is being sent either multicast or unicast.
A first database interface 30 may be included to connect CP 10 with CP database 32. CP database 32 may be employed as necessary to store system data relating to channel members (e.g., users or CCs), channel keys, program keys, and authentication information (e.g., digital certificates as in a public key infrastructure (PKI), or other means). A second database interface 34 may be included to connect SP 14 with SP database 36. SP database 36 may be employed as necessary to store system data relating to channel members, channel keys, program keys and authentication information (e.g., digital certificates as in a public key infrastructure (PKI), or other means). CC 1 2 may also be coupled by third database interface 37 to a CC database 38, for storing information relating to available channels and programs. It is well known that databases such as these support a variety of operations for updating and querying information contained in them.
III. System Functions
In one embodiment, the ICA system provides functions to accomplish a particular task. Functions comprise multiple, sequential operations across at least one of the system interfaces shown in Figure 2. In the aggregate, the functions implement network and content security in an inter-network conditional access system for multicasting digital content. One embodiment of the present invention provides at least four functions: creating a channel for distribution of program keys, adding a member to the channel, removing a member from the channel, and distributing program keys on the channel. One embodiment of the present invention provides at least seven operations: authenticate/authorize, request a channel be established, assign channel keys, assign program keys, report program, database update, and database select.
A. Create a Channel for Distribution of Program Keys Figure 3 is a diagram illustrating operations of a Create a Channel for Distribution of Program Keys function according to an embodiment of the present invention. This function requests an address from a SP by a CP for allocation as a channel on the SP's network. A channel comprises an address for sending program keys. Keys for programs may be distributed to a particular channel address. Channels may be created by a SP or a CP for the SP's network.
The Create a Channel for Distribution of Program Keys function may be implemented using the authenticate/authorize and request channel operations. First, SP 14 and CP 10 authenticate 50 each other, and an authorization check is made by the SP to confirm the rights of the CP. The CP then sends a request 52 to create a channel to the SP.
B. Adding a Member to the Channel
Either a SP or a CP may add a member (CC) to a channel to authorize a CC to provide a CC with a channel key and subsequently receive one or more program keys on the channel. Figure 4 is a diagram illustrating operations of the Adding a Member to the Channel function according to an embodiment of the present invention. This function may be used following execution of a successful Create a Channel for Distribution of Program Keys function to add a content consumer (CC) to the channel.
Adding a member to a channel owned by a SP may be implemented as follows. First, SP database 36 may be updated 54 by specifying to SP 14 the channel members and the authorization/authentication information to be modified along with the requested modifications. Next, SP 14 and CC 1 2 authenticate 56 each other, and SP performs an authorization check to confirm that the CC has rights to become a member of the channel. If successful, the SP adds a channel member 58 by sending channel information to the CC, thereby installing the channel key at the CC at 60. The CC then receives zero or more program keys on the channel and installs them at 62.
Figure 5 is a diagram illustrating operations of adding a member to a channel that is owned by a CP according to an embodiment of the present invention. This function may be used by the CP following execution of a successful Create Channel for Distribution of Program Keys functions to add content consumers (CCs) to the newly created channel, one at a time. In this embodiment, the SP does not have access to the unencrypted key to the channel nor to the program keys that are subsequently sent on the channel by the CP. Adding a member to a channel owned by a CP may be implemented as follows. First, CP database 32 may be updated 64 by specifying to CP 1 0 the members, channel, and authorization/authentication information to be modified along with the requested modifications. Next, CP 1 0 and CC 1 2 authenticate 66 each other. Following a successful authorization check, the CP adds a channel 68 by sending the channel key to the CC, thereby installing the channel at the CC. The CP installs a channel key 70 at the CC for the new channel. The CP also installs a program key 72 for zero or more programs to be received on the new channel. Additional keys may also be added for zero or more programs.
C. Removing a Channel Member
Either a SP or a CP may remove a member from a channel it owns. Figure 6 is a diagram illustrating operations of removing a channel member from a channel owned by a SP according to an embodiment of the present invention. This function may be used by the SP to remove a CC from a channel. To accomplish this, the member's authorization (e.g., the selected CC) may be first removed from SP database 36 for this channel and then the keys for the channel may be changed for all other members of the group accessing the channel.
Removing a member from a channel function for an SP Channel may be implemented as follows. First, SP database 36 may be updated 74 by specifying to SP 1 4 the channel, member, and authorization/authentication information to be modified along with the requested modifications. Next, in one embodiment, the SP installs a new key 76 for the channel for all CCs subscribed to this channel except for the CC to be removed, thereby preventing the removed channel member from accessing the channel. In other embodiments, other well-known mechanisms for efficiently changing the keys at CC computers using multicast communications may be employed. Figure 7 is a diagram illustrating operations of removing a member from a channel owned by a CP according to an embodiment of the present invention. This function may be used by the CP to remove a CC from a channel. To accomplish this, in one embodiment, the member (e.g., the selected CC) may be first removed from CP database 32 for this channel and then the keys for the channel may be changed for all other members of the group accessing the channel. Database operations to reflect the change may be authenticated and may be initiated by any party that is authorized by the CP or the SP. In other embodiments, other well-known mechanisms for efficiently changing the keys at CC computers using multicast communications may be employed.
Removing a member from a channel for a CP channel may be implemented at the CP as follows. First, CP database 32 may be updated 78 by specifying to CP 1 0 the members, channels, and authorization/authentication information to be modified along with the requested modifications. Next, in one embodiment, the CP may install a new key 80 for the channel for the channel for all CCs subscribed to this channel except for the CC to be removed, thereby preventing the removed channel member from accessing the channel. In other embodiments, other well-known mechanisms for efficiently changing the keys at CC computers using multicast communications may be employed.
P. Distributing Program Keys on a Channel Figure 8 is a diagram illustrating operations of a distributing program keys on a channel function according to an embodiment of the present invention. This function may be used in the ICA system to securely distribute program keys over a multicast network.
The distribute program keys function may be implemented as follows. First, CP database 32 may be updated 80 by specifying to CP 1 0 the program-specific information such as channel, start time, and stop time to be modified along with the requested modifications. Alternatively, SP database 36 may be updated by SP 14 with this information. Next, CP 1 0 and SP 14 authenticate 82 each other, and an authorization check is performed for the CP by the SP. The CP requests one or more program keys be sent on a channel from the SP by a distribute program keys on a channel 84 operation from the SP. The SP distributes the program key or keys 86 to CC 1 2. The CC then installs keys 88 for the decrypting program on the CC. In one embodiment, the CC reports the program 90 by informing a billing system (not shown) at the CP or the SP that the program key or keys are being used and optionally that the content is being received, decrypted and viewed. In other embodiments, new programs may be reported to a billing system or subscription system included in the CP or SP. The communication from the CC to the CP or the SP may take place over a back channel (not shown).
IV. System Operations
One embodiment of the present invention provides at least seven operations to implement the system functions described above: authenticate/authorize, request channel, assign channel keys, assign program keys, report program, database update, and database select.
A. Authenticate/Authorize
Two way authentication is well known in the art. One security protocol commonly used on computer networks, such as the Internet, is Internet Protocol Security (IPSec), which has a protocol for authenticating senders and receivers. This protocol supports authentication using Diffie- Hellman and RSA and credentials such as the International Telecommunications Union (ITU) standard X.509 certificate infrastructure, a Public Key Infrastructure (PKI), or through a shared-key arrangement. These and other authentication means may be used by embodiments of the present invention.
In two way authentication, both parties such as Content Provider (CP) and Service Provider (SP), CP and Content Consumer (CC), or SP and CC, mutually authenticate each other at the start of a communications or information exchange session. In one-way authentication, however, there is no back-channel from one destination to the other as in many geosynchronous satellite communications arrangements. One way authentication may be used in embodiments of the present invention through such means as "pre-shared" keys. For example, CP database 32 or CP database 36 may contain a shared secret key or a public key of a CC and data sent to the CC may be encrypted with this shared secret key or public key with the knowledge that only the CC who owns the corresponding secret key or private key portion of the public/private key pair will be able to decrypt the data. Similarly, the data may also be encrypted with the private key of the SP or CP and sent to the CC who has the corresponding public key of the public/private key pair of the sender (e.g., either the SP or the CP). In this way, the receiver will only be able to decrypt data sent by the particular sender. This may be used to avoid impersonation of the sender. The data that may be sent to the receiver may include a session key for a particular network stream of packets or a package of files that are being sent.
Authentication may be of two varieties, user authentication or platform authentication. An example of user authentication is when a person logs into a system using a password or even biometric data. The user may log in from different devices and be authenticated as a known user with known access rights to the system. An example of platform authentication is when a particular platform is authenticated using hardware and/or software features such as a unique identifier on a computer processor or a globally unique identifier on a version of the operating system that runs on the platform (such as a PC), or by a certificate, such as an X.509 certificate. For example, a caller-ID is a means of identifying an endpoint of a phone call, but the use of caller-ID does not identify which particular person is using the phone. On a general purpose computer such as a PC, however, there are various means for uniquely identifying the particular computer, such as processor identifier, or by various other means that are collectively referred to as a "dongle. " When the platform is authenticated by means of a dongle, then some assurance is given that the platform serving as the source or receiver of data is the platform that is authorized to receive the data.
In the one embodiment, an authentication technique such as asymmetric public key cryptography (e.g., RSA or Diffie-Hellman) as described in various methods above may be used to encrypt or decrypt data that comprises a channel key. As described above, this channel key is used to encrypt zero or more program keys. In this embodiment, the channel key is called the Key Encrypting Key (KEK). The sender of the KEK has assurances that only an authenticated and authorized receiver can decrypt it and the receiver of a KEK can be assured that only an authenticated and authorized sender may have encrypted it. The KEK may encrypt a symmetric key that is used to encrypt program keys called traffic encrypting keys (TEKs) . The TEKs may be used to encrypt data (e.g., program keys and program data) such as network packets that are sent to a group of one or more receivers. In one embodiment, the KEKs and TEKs may form a tree with a KEK corresponding to a subtree of receivers and TEKs corresponding to packet transmissions sent to receivers.
Figure 9 is a flow diagram illustrating an authentication/authorization operation according to an embodiment of the present invention. At block 1 00, a connection may be established between a two-party subset of the CP, SP or CC. At block 102, authentication may be performed using one of the methods described above. If authentication is successful at block 1 04, then the appropriate database is checked at block 1 05 to determine if the authenticated entity is authorized for the particular access. If authentication and authorization succeed at block 1 05, processing may performed, such as the transmission and/or the reception of data following the report of success shown in block 1 06. The error path of this processing occurs when the authentication/authorization operations of blocks 1 02 and 1 05 were not evaluated to be successful. This occurs when one of the parties did not successfully authenticate itself to the other or if the requesting entity was not authorized for the particular access. An authentication/authorization error may be processed in block 1 08, and in all cases, processing ceases at block 1 10.
Those skilled in the art of cryptography and network security will recognize that authentication may occur at the session level, such as at the commencement of communications and prior to the exchange of data among communicating endpoints, or it may occur at the packet level, where each packet is authenticated. When there are two communicating endpoints, the fact that the two endpoints share a secret key that is used for encrypting packets is implicit packet-level authentication since neither endpoint may impersonate the other. When there are more than two communicating endpoints, the situation becomes more complicated because any one of the endpoints may impersonate the sender when a symmetric key is used. There are well-known solutions to this problem using asymmetric cryptography. There also well-known solutions using the more efficient symmetric cryptography. Embodiments of the present invention may employ of any of these means.
B. Reguest Channel The request channel operation obtains a multicast address from a SP's multicast address space for access to the SP's network. The request may result in a success or a failure. A failure may result when there are no more addresses to assign, for example. The request channel operation may be initiated as database operations performed against tables stored within the SP database and/or the CP database. A database update attempt may trigger an address allocation request. The outcome of this request determines the success or failure of the operation. When the request is successful, a new channel record may be added to the database. Results of the request channel may need to be kept consistent with the SP and CP databases.
Figure 1 0 is a flow diagram illustrating a content provider request channel operation according to an embodiment of the present invention. At block 1 20, a request may be made by the CP to the SP to get address parameters. A requested address range may be one parameter of the request; additional request parameters may include the duration of time that the address will be used for the channel. If the parameters are valid at block 1 22, the address may be obtained from the SP at block 1 24. An example of an invalid parameter is a specification of a time duration or address range that cannot be satisfied. Otherwise, a new request to get address parameters from the SP is made again at block 1 20. If the request is successful at block 1 26, then processing ends at block 1 28. If the SP fails to successfully obtain a channel, the error may be processed at block 1 30.
Figure 1 1 is a flow diagram illustrating a service provider request channel operation according to an embodiment of the present invention. The SP may wait for new channel requests. When a request is received from a CP at block 1 40, the request may be analyzed to determine its validity. If the request is valid at block 1 42, a multicast address may be allocated according to the request's parameters at block 1 44. If the request is invalid at block 1 42, the error may be processed at block 146 by reporting the error and returning to a wait state until the next CP request is received. An attempt may be made to allocate the address from a local or a hierarchical multicast address allocation server. If the attempt is unsuccessful at block 1 48, the error may be processed at block 1 46. Otherwise, an update to a channel database may occur at block 1 50 as a transaction against all copies of database tuples for the channel at the SP database and the CP database. At block 1 52, the success of the request may be reported to the requesting CP. SP request channel process then completes at block 1 54.
C. Assign Channel Keys The assign channel keys operation installs a channel key for a content consumer (CC). A channel is a multicast address and a key for encrypting program keys that are sent to the channel address. A channel may carry one or more program keys encrypted with the channel key, and a program may be decrypted by a traffic encryption key (TEK). Information about channels may be represented as table entries in a subscriber database at the SP or the CP.
Figure 1 2 is a flow diagram illustrating content provider (CP) and service provider (SP) assign channel keys operations according to an embodiment of the present invention. A CP or SP adds a member to a channel by giving an address for the channel and the channel keys to the channel member following an authentication/authorization step. Once the channel key is generated, the key may be distributed to a channel member via unicast on a per channel member basis. The channel key is used to encrypt program keys that are sent to the channel address. The channel key may be communicated to the channel member by sending it directly to the channel member, by transmission on a unidirectional network such as a broadcast network, or may be distributed via a web request from the new channel member. A channel may use a trusted agent to prevent unauthorized copying of keys or agent software. A trusted agent protects the SP's keys using tamper-resistant techniques that prevent access to the keying material by application software other than the agent software that is authorized to use the key. A channel member is a CC who gets notice of the existence of a channel when it receives the address and is assigned keys for it.
A database update may be performed after an assign channel keys operation is completed and the member is successfully added to the channel. At block 1 60, an assign channel keys request may be obtained. At block 1 62, if the request is valid, then the requesting member may be authenticated/authorized at block 1 64. At block 1 66, if the authentication/authorization was successful, the member may be given keys to the channel at block 1 68. If the assign program keys operation succeeded, then the member was successfully added at block 1 70, the CP database (for CP processing) or the SP database (for SP processing) may be updated at block 1 72 to reflect the addition of the member to the channel. Processing is then complete at block 1 74. If an error is detected at blocks 1 62, 1 66, or 1 70, the error may be processed at block 1 76.
Figure 1 3 is a flow diagram illustrating a content consumer (CC) assign channel keys operation according to an embodiment of the present invention. If a CC is the target of the assign channel keys request (that is, a channel is being added to the channels accessible by this CC), then the processing shown in Figure 1 3 may be performed at the CC. At block 1 80, an assign channel keys request may be received from a SP or a CP. If the request is for this particular CC at block 1 82, the provider (either a CP or a SP) may be authenticated/authorized at block 1 84. If the authentication/authorization is successful at 1 86, the channel keys may be assigned and installed for use by the CC at block 1 88. If the channel key is to be tamper-resistant to prevent unauthorized duplication, a trusted agent may be installed on the content consumer (CC). The trusted agent handles the channel keys for the CC, and an SP or CP authenticates the trusted agent before providing a channel key to the CC. The CC will also authenticate the SP or CP and will only proceed if the SP or CP is authenticated. If the key assignment was successful at block 1 90, the CC monitors program keying material for the channel at block 1 92. Processing is then complete at block 1 94. If an error is detected at block 1 82, 1 86, or 1 90, the error may be processed at block 1 96.
P. Assign Program Keys
The assign program keys operation installs keys for a program. The key may be for a single address or multiple addresses. A program uses one or more keys to encrypt its data packet traffic. A program may require a trusted viewer for accessing the encrypted content that will protect the key and content from unauthorized use. In at least one embodiment of the present invention, the program key may be a tamper-resistant module.
Figure 1 4 is a flow diagram illustrating a service provider or content provider assign program keys operation according to an embodiment of the present invention. At block 300, a key request may be obtained by the SP or the CP to send program keys on a channel. A key request may be for a new set of program keys for an announcement, streams or package program, or to refresh the keys of a program to exclude certain members that have been removed from the channel. If the request is valid at block 302, one or more program keys may be generated at block 304. If the request is invalid at block 302, the error may be processed at block 306 and processing ends at block 308. An invalid request may be to assign keys or refresh the keys of a non-existing program or to remove a non-existent member from a channel. At block 31 0, the generated key may be sent to a channel member. Key distribution may be done on a sub-tree basis using multicast or on a single member basis. If more program keys are to distributed at block 31 2, then assign program keys processing continues with the next member at block 31 0. Otherwise, at block 31 4, the SP database may be updated for SP assign program keys processing, or the CP database may be updated for CP assign program keys processing. The distributed database update reflects the new system state existing after the end of successful assign program keys processing. SP or CP assign program keys processing ends at block 308.
Figure 1 5 is a flow diagram illustrating a content consumer assign program keys operation according to an embodiment of the present invention. At block 320, if a trusted viewer is not available on the CC, then a trusted viewer may be installed at block 322. A trusted viewer may be associated with a program. At block 324, an assign program keys request may be obtained. The request to assign keys to a program may be sent to a CC by a SP or CP either unicast or multicast. When the request is multicast, the assign program keys message may be received by a CC that is being removed as a channel member and thus that CC will not be able to decrypt the program key. Program keys may be assigned on a sub-tree basis using multicast or on a single member basis. At block 326, if the assign program keys request is meant for this CC, then one or more program keys may be updated at block 328. Program keys may be updated by refreshing the TEKs that are associated with the program. Otherwise, a new assign program keys request may again be obtained at block 324.
E. Report Program
The report program operation communicates when a CC joins or is receiving a program to a SP or a CP. An update of the SP database or the CP database occurs after receipt of the report. Parameters for the report may be obtained from an announcement, from a program key or channel key module, or may be viewer-specific. The report program message may be multicast or unicast. Implementation of the report program operation does not assume tethered consumption of content, and the report may be web based or updated periodically. Additionally, in one embodiment, a back channel interface may be used to convey the report information to either the SP database or the CP database.
V. Example of ICA System Processing
The ICA system may be used in one embodiment as follows. In a typical scenario for the ICA system, a channel may be created, at least one user may be added, and keys to a channel may be requested and distributed. When a channel is allocated and keys installed for that channel at one or more content consumer members of that channel, program keys can be sent to the members, whereby the program keys are encrypted in the channel key and sent to the channel address. Embodiments of the present invention accommodate various mechanisms for announcing, publicizing, notifying, sending and receiving program information such as distribution of digital information over packet networks. Besides adding users (which may be authenticated people or authenticated platforms), other operations may be used for removing users from the channel. The operations of adding or removing users, who are CC members of a channel, may be triggered by and may result in updates to a database management system operating at a SP or a CP. When a CC is removed from the channel, it may be necessary to change the channel key of all remaining CC members by assigning a new channel key to them.
Either through user intervention or as a result of an update to a database, a channel may be created by either the SP or the CP. The user, the platform, or the computer software that causes a channel to be created may be authenticated. As a result of channel creation, a database record may be created that includes information such as a channel name, a channel network address, channel policy information (e.g., identification of cryptographic algorithm, modes, key lengths, who may join the channel, etc.), and a CP or SP channel owner.
A CC (platform or user) may be added to a channel through user intervention or as a result of an update to a database at the SP or CP. The CC may be an authenticated platform or authenticated person. A database record may be created that includes information such as a CC name, a CC credentials, and other information. A CC receives a key to the channel upon being added to the ICA system. This channel key encrypts program keys, as described above. Each program may have its own traffic encryption key and even its own channel in a 'pay per view' embodiment. Alternatively, each channel may be used to carry keys for multiple programs as in a subscriber embodiment.
A group of content consumers (users or platforms) may receive multicast content that is 'pushed' to users as in Internet Protocol (IP) multicast networks. In this embodiment, multicast distribution of channel and program keys complements the multicast nature of the digital content distribution. Alternatively, individual users may request digital content be delivered directly to them in a unicast embodiment of the present invention. If the digital content is delivered unicast to the CC, such as on networks that do not support multicast operation, then the keying material may also be requested and received unicast, such as channel and program keys that are 'pulled' to the CC by a web browser application. In both cases of multicast and unicast distribution, there is a common structure of keying material for channel and program keys. The operations described herein are applicable to both the unicast and multicast cases.
In both the unicast and multicast cases, there is a corresponding operation to add information about the channel, program, or CC to the CP or SP database. The CP database may be updated when the CP maintains the security associations (SAs) for the program as, for example, when a company is sending proprietary information to its offices using a network service provider and the program in question is not to be shared with the network service provider (SP). In either case of a CP or SP database update, an association may be formed between the channel, one or more programs, and one or more CC members.
Members may need to be removed from a channel when, for example, their subscription expires to channel content. This operation may be accomplished by multicast or unicast distribution of new channel keys to the remaining members of the channel. In the case of multicast, there are efficient means of distributing keys to large numbers of channel members that are logarithmic in complexity and which do not require unicast exchanges between the key management center in the CP or SP and individual members. Those skilled in the art of multicast networking will recognize that a user may be added or removed from a channel with logarithmic message, storage and processing complexity when a tree or hierarchical structure is used. Embodiments of the present invention use hierarchical data structures for managing keys to change the keys of members after a member is removed from a channel or before a new member is added to the channel. The removal of a user may be accompanied by an update the database system in the CP or the SP to remove any association with the user and the channel or program.
In the preceding description, various aspects of the present invention have been described. For purposes of explanation, specific numbers, systems and configurations were set forth in order to provide a thorough understanding of the present invention. However, it is apparent to one skilled in the art that the present invention may be practiced without the specific details. In other instances, well-known features were omitted or simplified in order not to obscure the present invention.
Embodiments of the present invention may be implemented in hardware or software, or a combination of both. However, embodiments of the invention may be implemented as computer software executing on programmable systems comprising at least one processor, a data storage system (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. One or more of service providers (SPs), content providers (CPs), and content consumers (CCs) may be implemented as programmable systems. Programmable software may be applied to input data to perform the functions described herein and generate output information. The output information may be applied to one or more output devices, in known fashion. For purposes of this application, a processing system includes any system that has a processor, such as, for example, a digital signal processor (DSP), a microcontroller, an application specific integrated circuit (ASIC), or a microprocessor.
The programs may be implemented in a high level procedural or object oriented programming language to communicate with a processing system. The programs may also be implemented in assembly or machine language, if desired. In fact, the invention is not limited in scope to any particular programming language. In any case, the language may be a compiled or interpreted language. The programs may be stored on a storage media or device (e.g., hard disk drive, floppy disk drive, read only memory (ROM), CD-ROM device, flash memory device, digital versatile disk (DVD), or other storage device) readable by a general or special purpose programmable processing system, for configuring and operating the processing system when the storage media or device is read by the processing system to perform the procedures described herein. Embodiments of the invention may also be considered to be implemented as a machine-readable storage medium, configured for use with a processing system, where the storage medium so configured causes the processing system to operate in a specific and predefined manner to perform the functions described herein.
An example of one such type of processing system is shown in Figure 1 6. Sample system 400 may be used, for example, to execute the processing for methods employed by the content provider, service provider, or content consumer, in accordance with the present invention, such as the embodiment described herein. Sample system 400 is representative of processing systems based on the PENTIUM®, PENTIUM® Pro, PENTIUM® II, PENTIUM® III, and CELERON™ microprocessors available from Intel Corporation, although other systems (including personal computers (PCs) having other microprocessors, engineering workstations, set-top boxes and the like) may also be used. In one embodiment, sample system 400 may be executing a version of the WINDOWS™ operating system available from Microsoft Corporation, although other operating systems and graphical user interfaces, for example, may also be used.
Figure 1 6 is a block diagram of a system 400 of one embodiment of the present invention. The computer system 400 includes a processor 402 that processes data signals. The processor 402 may be a complex instruction set computer (CISC) microprocessor, a reduced instruction set computing (RISC) microprocessor, a very long instruction word (VLIW) microprocessor, a processor implementing a combination of instruction sets, or other processor device, such as a digital signal processor, for example. Figure 1 6 shows an example of an embodiment of the present invention implemented as a single processor system 400. However, it is understood that embodiments of the present invention may alternatively be implemented as systems having multiple processors. Processor 402 may be coupled to a processor bus 404 that transmits data signals between processor 402 and other components in the system 400.
System 400 includes a memory 406. Memory 406 may be a dynamic random access memory (DRAM) device, a static random access memory (SRAM) device, or other memory device. Memory 406 may store instructions and/or data represented by data signals that may be executed by processor 402. The instructions and/or data may comprise code for performing any and/or all of the techniques of the present invention. Memory 406 may also contain additional software and/or data (not shown). A cache memory 408 may reside inside processor 402 that stores data signals stored in memory 406. Cache memory 408 in this embodiment speeds up memory accesses by the processor by taking advantage of its locality of access. Alternatively, in another embodiment, the cache memory may reside external to the processor.
A bridge/memory controller 41 0 may be coupled to the processor bus 404 and memory 406. The bridge/memory controller 41 0 directs data signals between processor 402, memory 406, and other components in the system 400 and bridges the data signals between processor bus 404, memory 406, and a first input/output (I/O) bus 41 2. In some embodiments, the bridge/memory controller provides a graphics port for coupling to a graphics controller 41 3. In this embodiment, graphics controller 41 3 interfaces to a display device (not shown) for displaying images rendered or otherwise processed by the graphics controller 41 3 to a user.
First I/O bus 41 2 may comprise a single bus or a combination of multiple buses. First I/O bus 41 2 provides communication links between components in system 400. A network controller 41 4 may be coupled to the first I/O bus 41 2. The network controller links system 400 to a network that may include a plurality of processing systems (not shown in Figure 1 6) and supports communication among various systems. The network of processing systems may comprise a local area network (LAN), a wide area network (WAN), the Internet, or other network. In some embodiments, a display device controller 41 6 may be coupled to the first I/O bus 41 2. The display device controller 41 6 allows coupling of a display device to system 400 and acts as an interface between a display device (not shown) and the system. The display device may comprise a television set, a computer monitor, a flat panel display, or other suitable display device. The display device receives data signals from processor 402 through display device controller 41 6 and displays information contained in the data signals to a user of system 400.
In some embodiments, camera 41 8 may be coupled to the first I/O bus to capture live events. Camera 418 may comprise a digital video camera having internal digital video capture hardware that translates a captured image into digital graphical data. The camera may comprise an analog video camera having digital video capture hardware external to the video camera for digitizing a captured image. Alternatively, camera 41 8 may comprise a digital still camera or an analog still camera coupled to image capture hardware. A second I/O bus 420 may comprise a single bus or a combination of multiple buses. The second I/O bus 420 provides communication links between components in system 400. A data storage device 422 may be coupled to the second I/O bus 420. The data storage device 422 may comprise a hard disk drive, a floppy disk drive, a CD-ROM device, a flash memory device, or other mass storage device. Data storage device 422 may comprise one or a plurality of the described data storage devices.
A keyboard interface 424 may be coupled to the second I/O bus 420. Keyboard interface 424 may comprise a keyboard controller or other keyboard interface device. Keyboard interface 424 may comprise a dedicated device or may reside in another device such as a bus controller or other controller device. Keyboard interface 424 allows coupling of a keyboard to system 400 and transmits data signals from a keyboard to system 400. A user input interface 425 may be coupled to the second I/O bus 420. The user input interface may be coupled to a user input device, such as a mouse, joystick, or trackball, for example, to provide input data to the computer system. Audio controller 426 may be coupled to the second I/O bus 420. Audio controller 426 operates to coordinate the recording and playback of audio signals. A bus bridge 428 couples first I/O bridge 41 2 to second I/O bridge 420. The bus bridge operates to buffer and bridge data signals between the first I/O bus 41 2 and the second I/O bus 420.
Embodiments of the present invention are related to the use of the system 400 to provide a portion of an inter-network conditional access system. According to one embodiment, provision of content provider, service provider, and/or content consumer operations may be performed by the system 400 in response to processor 402 executing sequences of instructions in memory 404. Such instructions may be read into memory 404 from another computer-readable medium, such as data storage device 422, or from another source via the network controller 414, for example. Execution of the sequences of instructions causes processor 402 to perform content provider, service provider, and/or content consumer operations according to embodiments of the present invention. In an alternative embodiment, hardware circuitry may be used in place of or in combination with software instructions to implement embodiments of the present invention. Thus, the present invention is not limited to any specific combination of hardware circuitry and software.
The elements of system 400 perform their conventional functions well-known in the art. In particular, data storage device 422 may be used to provide long-term storage for the executable instructions and data structures for embodiments of methods of performing content provider, service provider, and/or content consumer operations in accordance with the present invention, whereas memory 406 is used to store on a shorter term basis the executable instructions of embodiments of the methods for performing content provider, service provider, and/or content consumer operations in accordance with the present invention during execution by processor 402.
A system that unifies network security and application/content security in a single system to protect a service provider's service and to secure a content provider's content has been described.
While this invention has been described with reference to illustrative embodiments, this description is not intended to be construed in a limiting sense. Various modifications of the illustrative embodiments, as well as other embodiments of the invention, which are apparent to persons skilled in the art to which the inventions pertains are deemed to lie within the spirit and scope of the invention.

Claims

CLAIMSWhat is claimed is:
1 . An inter-network conditional access system comprising: at least one content provider to provide digital content; and at least one service provider, communicatively coupled to the at least one content provider, to securely receive the digital content from the at least one content provider and to securely distribute the digital content; and wherein the at least one content provider and the at least one service provider create a first relationship of trust between the at least one content provider and the at least one service provider.
2. The inter-network conditional access system of claim 1 , further comprising: at least one content consumer, communicatively coupled to the at least one service provider, to securely receive the digital content from the at least one service provider and to securely consume the digital content; and wherein the at least one content consumer and the at least one service provider create a second relationship of trust between the at least one content consumer and the at least one service provider.
3. The inter-network conditional access system of claim 2, wherein the at least one content consumer is communicatively coupled to the at least one content provider; and wherein the at least one content consumer and the at least one content provider create a third relationship of trust between the at least one content consumer and the at least one content provider.
4. The inter-network conditional access system of claim 1 , wherein the at least one content provider is communicatively coupled to the at least one service provider by a first interface, the first interface being used to perform at least one of authentication/authorization, request channel, and assign channel keys operations.
5. The inter-network conditional access system of claim 2, wherein the at least one service provider is communicatively coupled to the at least one content consumer by a second interface, the second interface being used to perform at least one of authentication/authorization, assign channel keys, assign program keys, and report program operations.
6. The inter-network conditional access system of claim 3, wherein the at least one content provider is communicatively coupled to the at least one content consumer by a third interface, the third interface being used to perform at least one of authentication/authorization, assign channel keys, assign program keys, and report program operations.
7. The inter-network conditional access system of claim 1 , further comprising a first database coupled to the at least one service provider to store information relating to at least one of channels, members of channels, and multicast addresses of channels.
8. The inter-network conditional access system of claim 1 , further comprising a second database coupled to the at least one content provider to store information relating to at least one of channels, members of channels, programs, and authorization/authentication information.
9. The inter-network conditional access system of claim 2, further comprising a third database coupled to the at least one content consumer to store information relating to at least one of channels and programs.
1 0. The inter-network conditional access system of claim 2, wherein the at least one content consumer comprises a trusted viewer for processing the digital content received from the at least one service provider.
1 1 . The inter-network conditional access system of claim 2, wherein the digital content is encrypted by the at least one content provider and decrypted by the at least one content consumer.
1 2. The inter-network conditional access system of claim 1 , wherein the system operates in a multicast network environment.
1 3. In an inter-network conditional access system having at least one service provider and at least one content consumer, a method of providing content comprising: encrypting digital content with at least one key; transmitting the encrypted digital content to the at least one service provider; requesting creation of a secure channel for distribution of the encrypted digital content by the at least one service provider; requesting creation of a program to be sent on the channel, the program comprising the encrypted digital content; and installing the at least one key at the at least one content consumer for decrypting the program.
1 4. The method of claim 1 3, further comprising performing authentication of at least one of the at least one service provider and the at least one content consumer.
1 5. The method of claim 1 3, further comprising adding the at least one content consumer as a member to the channel.
1 6. The method of claim 1 5, further comprising removing the at least one content consumer as a member from the channel.
1 7. In an inter-network conditional access system having at least one content provider and at least one content consumer, a method of providing service comprising: receiving encrypted digital content from the at least one content provider; creating a secure channel for distribution of the encrypted digital content; creating at least one key for decrypting the encrypted digital content sent on the channel, the program comprising the encrypted digital content; and sending the at least one key to the at least one content consumer.
1 8. The method of claim 1 7, further comprising adding the at least one content consumer as a member to the channel.
1 9. The method of claim 1 7, further comprising removing the at least one content consumer as a member from the channel.
20. The method of claim 1 7, further comprising performing authentication of at least one of the at least one content provider and the at least one content consumer.
21 . In an inter-network conditional access system having at least one content provider and at least one service provider, a method of consuming content comprising: receiving first and second keys distributed on a secure channel, the first key for gaining access to the secure channel and the second key for decrypting the program communicated over the secure channel, the program comprising encrypted digital content, and the first key being encrypted by the second key; decrypting the second key using the first key; and decrypting the encrypted digital content using the decrypted second key.
22. The method of claim 21 , further comprising viewing the decrypted digital content with a trusted viewer.
23. The method of claim 21 , further comprising reporting the decrypting and viewing to at least one of the at least one service provider and the at least one content provider.
24. The method of claim 21 , further comprising performing authentication of at least one of the at least one service provider and the at least one content provider.
25. An article comprising a machine readable medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions cause a content provider, in an inter-network conditional access system having at least one service provider and at least one content consumer, to: encrypt digital content with at least one key; transmit the encrypted digital content to the at least one service provider; request creation of a secure channel for distribution of the encrypted digital content by the at least one service provider; request creation of a program to be sent on the channel, the program comprising the encrypted digital content; and install the at least one key at the at least one content consumer for decrypting the program.
26. An article comprising a machine readable medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions cause a service provider, in an inter-network conditional access system having at least one content provider and at least one content consumer, to: receive encrypted digital content from the at least one content provider; create a secure channel for distribution of the encrypted digital content; create at least one key for decrypting the encrypted digital content sent on the channel, the program comprising the encrypted digital content; and send the at least one key to the at least one content consumer.
27. An article comprising a machine readable medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions cause a content consumer, in an inter-network conditional access system having at least one content provider and at least one service provider to: receive first and second keys distributed on a secure channel, the first key for gaining access to the secure channel and the second key for decrypting the program communicated over the secure channel, the program comprising encrypted digital content, and the first key being encrypted by the second key; decrypt the second key using the first key; and decrypt the encrypted digital content using the decrypted second key.
PCT/US2000/021337 1999-08-10 2000-08-02 System and method for securely distributing content to groups of receivers WO2001011883A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2001515625A JP2003506974A (en) 1999-08-10 2000-08-02 System and method for securely distributing content to a group of recipients
AU65196/00A AU6519600A (en) 1999-08-10 2000-08-02 System and method for securely distributing content to groups of receivers
EP00952513A EP1205072A1 (en) 1999-08-10 2000-08-02 System and method for securely distributing content to groups of receivers
HK02104996.4A HK1043273A1 (en) 1999-08-10 2002-07-03 System and method for securely distributing content to groups of receivers

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US37175599A 1999-08-10 1999-08-10
US09/371,755 1999-08-10

Publications (1)

Publication Number Publication Date
WO2001011883A1 true WO2001011883A1 (en) 2001-02-15

Family

ID=23465286

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/021337 WO2001011883A1 (en) 1999-08-10 2000-08-02 System and method for securely distributing content to groups of receivers

Country Status (5)

Country Link
EP (1) EP1205072A1 (en)
JP (1) JP2003506974A (en)
AU (1) AU6519600A (en)
HK (1) HK1043273A1 (en)
WO (1) WO2001011883A1 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002319972A (en) * 2001-04-20 2002-10-31 Sony Corp Communication system
FR2858899A1 (en) * 2003-08-11 2005-02-18 Medialive Digital audiovisual flow distribution process, involves proceeding on flow before its transmission to recipient equipment by separation of flow into two parts and transmitting complementary information and flow
WO2005020541A1 (en) * 2003-08-13 2005-03-03 Thomson Licensing Method and device for securing content delivery over a communication network via content keys
WO2006044052A2 (en) * 2004-10-18 2006-04-27 Akimbo Systems Inc. Method and apparatus for content download
EP1876549A1 (en) * 2006-07-07 2008-01-09 Swisscom Mobile AG Method and system for encrypted data transmission
AU2002233609B2 (en) * 2001-03-28 2008-05-29 Nds Limited Digital rights management system and method
US8634557B2 (en) 2011-12-02 2014-01-21 Kabushiki Kaisha Toshiba Semiconductor storage device
US8650393B2 (en) 2011-11-11 2014-02-11 Kabushiki Kaisha Toshiba Authenticator
US8661527B2 (en) 2011-08-31 2014-02-25 Kabushiki Kaisha Toshiba Authenticator, authenticatee and authentication method
US8667286B2 (en) 2012-01-16 2014-03-04 Kabushiki Kaisha Toshiba Host device, semiconductor memory device, and authentication method
US8732466B2 (en) 2011-12-02 2014-05-20 Kabushiki Kaisha Toshiba Semiconductor memory device
US8761389B2 (en) 2011-12-02 2014-06-24 Kabushiki Kaisha Toshiba Memory
US8812843B2 (en) 2011-12-02 2014-08-19 Kabushiki Kaisha Toshiba Device and authentication method therefor
US8984294B2 (en) 2013-02-15 2015-03-17 Kabushiki Kaisha Toshiba System of authenticating an individual memory device via reading data including prohibited data and readable data
US9166783B2 (en) 2010-10-14 2015-10-20 Kabushiki Kaisha Toshiba Protection method, decryption method, player, storage medium, and encryption apparatus of digital content
US9201811B2 (en) 2013-02-14 2015-12-01 Kabushiki Kaisha Toshiba Device and authentication method therefor
CN114268817A (en) * 2021-12-29 2022-04-01 北京连屏科技有限公司 Media asset management method

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8528029B2 (en) * 2005-09-12 2013-09-03 Qualcomm Incorporated Apparatus and methods of open and closed package subscription
US8893179B2 (en) 2005-09-12 2014-11-18 Qualcomm Incorporated Apparatus and methods for providing and presenting customized channel information
JP4740830B2 (en) * 2005-12-14 2011-08-03 エヌヴィディア コーポレイション Chipset security off-road engine

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997028649A1 (en) * 1996-01-30 1997-08-07 Oy Nokia Ab Scrambling of digital media objects in connection with transmission and storage
US5787089A (en) * 1996-07-25 1998-07-28 Northern Telecom Limited Digital signal broadcasting
WO1999007149A1 (en) * 1997-08-01 1999-02-11 Scientific-Atlanta, Inc. Source authentication of download information in a conditional access system
US6055314A (en) * 1996-03-22 2000-04-25 Microsoft Corporation System and method for secure purchase and delivery of video content programs

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997028649A1 (en) * 1996-01-30 1997-08-07 Oy Nokia Ab Scrambling of digital media objects in connection with transmission and storage
US6055314A (en) * 1996-03-22 2000-04-25 Microsoft Corporation System and method for secure purchase and delivery of video content programs
US5787089A (en) * 1996-07-25 1998-07-28 Northern Telecom Limited Digital signal broadcasting
WO1999007149A1 (en) * 1997-08-01 1999-02-11 Scientific-Atlanta, Inc. Source authentication of download information in a conditional access system

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2002233609B2 (en) * 2001-03-28 2008-05-29 Nds Limited Digital rights management system and method
US7512986B2 (en) 2001-03-28 2009-03-31 Nds Limited Digital rights management system and method
JP2002319972A (en) * 2001-04-20 2002-10-31 Sony Corp Communication system
JP4552348B2 (en) * 2001-04-20 2010-09-29 ソニー株式会社 Communications system
US7974280B2 (en) 2003-08-11 2011-07-05 Querell Data Limited Liability Company Distributed and secured method and system for protecting and distributing audio-visual flows
FR2858899A1 (en) * 2003-08-11 2005-02-18 Medialive Digital audiovisual flow distribution process, involves proceeding on flow before its transmission to recipient equipment by separation of flow into two parts and transmitting complementary information and flow
WO2005018232A3 (en) * 2003-08-11 2005-10-06 Medialive Distributed and secured method and system for protecting and distributing audio-visual flows
US7613182B2 (en) 2003-08-11 2009-11-03 Daniel Lecomte Distributed and secured method and system for protecting and distributing audiovisual flows
WO2005018232A2 (en) * 2003-08-11 2005-02-24 Medialive Distributed and secured method and system for protecting and distributing audio-visual flows
WO2005020541A1 (en) * 2003-08-13 2005-03-03 Thomson Licensing Method and device for securing content delivery over a communication network via content keys
WO2006044052A2 (en) * 2004-10-18 2006-04-27 Akimbo Systems Inc. Method and apparatus for content download
WO2006044052A3 (en) * 2004-10-18 2006-06-15 Akimbo Systems Inc Method and apparatus for content download
US8484468B2 (en) 2006-07-07 2013-07-09 Swisscom Ag Process and system for selectable data transmission
US10972440B2 (en) 2006-07-07 2021-04-06 Swisscom Ag Process and system for selectable data transmission
EP1876549A1 (en) * 2006-07-07 2008-01-09 Swisscom Mobile AG Method and system for encrypted data transmission
US10097519B2 (en) 2006-07-07 2018-10-09 Swisscom Ag Process and system for selectable data transmission
US9479486B2 (en) 2006-07-07 2016-10-25 Swisscom Ag Process and system for selectable data transmission
US9166783B2 (en) 2010-10-14 2015-10-20 Kabushiki Kaisha Toshiba Protection method, decryption method, player, storage medium, and encryption apparatus of digital content
US8661527B2 (en) 2011-08-31 2014-02-25 Kabushiki Kaisha Toshiba Authenticator, authenticatee and authentication method
US10361850B2 (en) 2011-08-31 2019-07-23 Toshiba Memory Corporation Authenticator, authenticatee and authentication method
US10361851B2 (en) 2011-08-31 2019-07-23 Toshiba Memory Corporation Authenticator, authenticatee and authentication method
US9887841B2 (en) 2011-08-31 2018-02-06 Toshiba Memory Corporation Authenticator, authenticatee and authentication method
US9100187B2 (en) 2011-11-11 2015-08-04 Kabushiki Kaisha Toshiba Authenticator
US8650393B2 (en) 2011-11-11 2014-02-11 Kabushiki Kaisha Toshiba Authenticator
US8732466B2 (en) 2011-12-02 2014-05-20 Kabushiki Kaisha Toshiba Semiconductor memory device
US8855297B2 (en) 2011-12-02 2014-10-07 Kabushiki Kaisha Toshiba Device and authentication method therefor
US8812843B2 (en) 2011-12-02 2014-08-19 Kabushiki Kaisha Toshiba Device and authentication method therefor
US8761389B2 (en) 2011-12-02 2014-06-24 Kabushiki Kaisha Toshiba Memory
US8634557B2 (en) 2011-12-02 2014-01-21 Kabushiki Kaisha Toshiba Semiconductor storage device
US9160531B2 (en) 2012-01-16 2015-10-13 Kabushiki Kaisha Toshiba Host device, semiconductor memory device, and authentication method
US8990571B2 (en) 2012-01-16 2015-03-24 Kabushiki Kaisha Toshiba Host device, semiconductor memory device, and authentication method
US8667286B2 (en) 2012-01-16 2014-03-04 Kabushiki Kaisha Toshiba Host device, semiconductor memory device, and authentication method
US9201811B2 (en) 2013-02-14 2015-12-01 Kabushiki Kaisha Toshiba Device and authentication method therefor
US8984294B2 (en) 2013-02-15 2015-03-17 Kabushiki Kaisha Toshiba System of authenticating an individual memory device via reading data including prohibited data and readable data
CN114268817A (en) * 2021-12-29 2022-04-01 北京连屏科技有限公司 Media asset management method
CN114268817B (en) * 2021-12-29 2023-12-29 北京连屏科技有限公司 Media resource management method

Also Published As

Publication number Publication date
HK1043273A1 (en) 2002-09-06
EP1205072A1 (en) 2002-05-15
JP2003506974A (en) 2003-02-18
AU6519600A (en) 2001-03-05

Similar Documents

Publication Publication Date Title
WO2001011883A1 (en) System and method for securely distributing content to groups of receivers
US7995603B2 (en) Secure digital content delivery system and method over a broadcast network
CA2509206C (en) System for digital rights management using distributed provisioning and authentication
US6424717B1 (en) Encryption devices for use in a conditional access system
US6744892B2 (en) Method and apparatus for geographically limiting service in a conditional access system
US6292568B1 (en) Representing entitlements to service in a conditional access system
EP1010323B1 (en) Verification of the source of program of information in a conditional access system
US7328343B2 (en) Method and apparatus for hybrid group key management
US7149308B1 (en) Cryptographic communications using in situ generated cryptographic keys for conditional access
US20040003008A1 (en) Method for partially encrypting program data
EP1000509A1 (en) Encryption devices for use in a conditional access system
JP2005253109A (en) Conditional access system
US20060047976A1 (en) Method and apparatus for generating a decrpytion content key
JP2005245010A (en) Source authentication of download information in conditional access system
JP2005245007A (en) Registration of service in conditional access system
JP2006333531A (en) Authorization of service in conditional access system
US20230132485A1 (en) System for Thin Client Devices in Hybrid Edge Cloud Systems
EP1290885B1 (en) Secure digital content delivery system and method over a broadcast network
WO2016189105A1 (en) Management of broadcast encrypted digital multimedia data receivers
US8699710B2 (en) Controlled security domains
JP3654342B2 (en) Method and apparatus for geographically limiting service in a conditional access system
JP2003174440A (en) Method and system for distributing contents, routing device with authenticating function, and client device
EP1193974A2 (en) Representing entitlements to service in a conditional access system
Mittra Scalable secure group communication
IL152435A (en) Secure digital content delivery system and method over a broadcast network

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2000952513

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2000952513

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWW Wipo information: withdrawn in national office

Ref document number: 2000952513

Country of ref document: EP