WO2001022724A1 - Multimedia digital terminal and detachable module cooperating with the terminal comprising an interface protected against copying - Google Patents
Multimedia digital terminal and detachable module cooperating with the terminal comprising an interface protected against copying Download PDFInfo
- Publication number
- WO2001022724A1 WO2001022724A1 PCT/EP2000/008439 EP0008439W WO0122724A1 WO 2001022724 A1 WO2001022724 A1 WO 2001022724A1 EP 0008439 W EP0008439 W EP 0008439W WO 0122724 A1 WO0122724 A1 WO 0122724A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- control words
- module
- emb
- data stream
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/43607—Interfacing a plurality of external cards, e.g. through a DVB Common Interface [DVB-CI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/163—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
Definitions
- Multimedia digital terminal and detachable module cooperating with the terminal comprising an interface protected against copying
- the present invention relates to the field of conditional access systems for multimedia digital terminals. It relates more particularly to a multimedia digital terminal as well as to a detachable module associated with this terminal for implementing a conditional access system, in which the interface between the terminal and the module is protected against illicit copying.
- the invention has been embodied within the context of the so-called DVB-CI interface (the initials standing for "Digital Video Broadcasting - Common Interface” which is described in particular in European Standard EN 50221 published by CENELEC (Comite Europeen de Normalisation Electrotechnique) .
- This DVB-CI common interface has been defined by the DVB group so as to allow standardization of digital receiving equipment whilst allowing service providers supplying the data, (for example suppliers of Pay TV programmes) to remain proprietors of the conditional access system and of the corresponding security elements. This is because a conditional access system must be envisaged whenever it is necessary to control access to broadcast data. However, the service providers supplying the data wish to preserve a specific conditional access system.
- the specific proprietary elements can be integrated into a module which is separate from the standardized parts of the terminal which receive and decode the digital video data or the service data. Thus, the proprietary elements can be manufactured and sold separately from the terminals, thereby making their distribution easier.
- the module is referred to as a "DVB-CI module" by extension.
- the aforesaid European standard describes in particular the hardware and software architecture of the common interface between a server (the host) and one or more DVB-CI modules connected to the server. We have represented this architecture in Figure
- the host server 1 is a multimedia digital terminal such as a decoder of programmes broadcast by satellite or by cable, a video recorder or a personal computer, to which may be connected one or more modules 2.
- the module 2 is a detachable device which cannot operate alone but which is intended to execute certain specific tasks in association with the host server, in particular the implementation of a conditional access system or of an electronic programme guide. To do this, the module can access resources, that is to say software or hardware functional units, of the host server.
- the aforesaid common interface standard defines for this purpose a certain number of objects able to be exchanged between the module and the host server and allowing the module to use the resources of the host server.
- the digital data are transmitted in the form of an information stream coded according to the MPEG 2 standard (ISO/IEC 13818-1), but naturally any other data transport standard can be used within the framework of the invention.
- MPEG 2 standard ISO/IEC 13818-1
- the digital terminal 1 of Figure 1 comprises a tuner/demodulator 10 which receives a signal S, emanating from a satellite antenna or from a cable network, and which outputs a digital data stream transmitted in the form of packets, and referred to as the TS (standing for "Transport Stream") in the aforesaid MPEG 2 standard, and containing the services supplied by providers.
- a tuner/demodulator 10 which receives a signal S, emanating from a satellite antenna or from a cable network, and which outputs a digital data stream transmitted in the form of packets, and referred to as the TS (standing for "Transport Stream") in the aforesaid MPEG 2 standard, and containing the services supplied by providers.
- the data stream TS comprises, in a known manner, packets of data supplied by various service providers and, so as to guarantee that the data reach only those users having acquired the right to receive them (for example by means of a subscription to the service) , these data are transmitted whilst being scrambled by control words CW.
- the service provider In order to descramble the data, the service provider also supplies the users with the control words having served to scramble the data. So as to keep the control words secret, they are supplied after having been encrypted with an algorithm with key K.
- the various encrypted control words are sent to the users in control messages, commonly denoted ECMs (the abbreviation ECM standing for "Entitlement Control Message") transmitted in the data stream TS .
- ECMs the abbreviation ECM standing for "Entitlement Control Message
- the control words are thereafter decrypted in a secure processor containing the key K, the secure processor being included within a security element, for example a smart card, which is supplied to the users .
- TS(D.EMB.) therefore denotes the data stream TS containing the data in scrambled form.
- all the elements of the conditional access system which are specific to the service provider are contained in the detachable module 2 which receives the data stream TS(D.EMB.) from the digital terminal 1 across the DVB-CI common interface.
- the module 2 comprises a microcontroller 21, in which the access control software application CA specific to the service provider is executed.
- the video or audio data packets are sent to a descrambler 23 contained in the module 2 whilst the messages ECM are sent to a smart card 3 which has been inserted into the module 2 and which contains, in a secure processor 30, the key K having served to encrypt the control words.
- the decryption of the control words contained in the messages ECM is performed by the secure processor 30 which outputs the control words CW unenciphered to the descrambler 23 situated in the module 2.
- the descrambler 23 is thus in a position to descramble the video or audio data packets received from the demultiplexer 22 by virtue of the control words CW which it receives from the smart card 3. It outputs a digital data stream TS(D.DES.) in which the data packets corresponding to the service which has been selected by the user are descrambled.
- the data stream TS(D.DES.) is transmitted to the digital terminal 1 via the DVB-CI common interface. It is more particularly transmitted to an MPEG decoder 14 of the terminal which supplies the audio and video outputs of the terminal which can be read directly by an apparatus such as a television.
- the terminal 1 also comprises a microcontroller 11 in which the various software applications of the terminal are executed.
- the DVB-CI common interface in fact comprises two logic interfaces: the first, the interface of the data stream ITTS, constitutes a bi-directional bus and transports the digital data packets of the TS stream in both directions between the terminal 1 and the module 2 according to the
- the stream TS(D.EMB.) transmitted via the ITTS interface is a scrambled data stream whilst in the other direction stream TS(D.DES)), and on condition that the module 2 allows access to the data selected by the user
- the packets containing the selected data are returned descrambled whilst the remainder of the TS stream remains unchanged;
- the command interface ITCOM transmits commands in both directions between the terminal 1 and the module 2 (more particularly between the microcontrollers 11 and 21) by way of the objects (or primitive functionalities) defined in the standard and which were mentioned above.
- the current DVB-CI common interface cannot guarantee this protection against copying since, the module 2 being detachable, it is possible for a pirate to connect a digital recorder to a connection port across which the stream TS(D.DES.) travels and to record the data packets which flow unenciphered.
- a purpose of the present invention is to solve the aforesaid problems by providing means of ensuring protection against copying at the level of the common interface between a digital terminal and a module which are linked together by an interface of the DVB-CI type.
- the invention therefore relates to a multimedia digital terminal intended for receiving a stream of digital data scrambled by control words, the control words being contained in the stream in encrypted form, and intended to cooperate with a detachable module for descrambling the data stream.
- the terminal is able to transmit the scrambled data stream to the detachable module.
- the terminal is furthermore capable of receiving from the detachable module the decrypted control words, and it comprises a descrambler capable of descrambling the digital data stream by using the control words received from the detachable module.
- the descrambling of the data is therefore performed solely in the decoder and no data item now travels unenciphered at the level of the interface between the terminal and the detachable module. The risks of illicit copies are therefore considerably reduced by virtue of the invention.
- the digital terminal is furthermore able to receive from the detachable module the scrambled digital data stream, wherein the data stream received by the terminal is not modified relative to the data stream transmitted by the terminal.
- the digital terminal is able to receive from the detachable module the scrambled digital data stream from which, relative to the data stream transmitted by the terminal, the data packets containing the control words have been removed.
- the terminal is able to transmit the scrambled data stream to the detachable module across a first interface with the detachable module, and it is furthermore capable of receiving from the detachable module the decrypted control words across a second interface with said module.
- the terminal is furthermore able to receive from the detachable module, across the first interface, the scrambled digital data stream.
- the invention also relates to a multimedia digital terminal intended for receiving a stream of digital data scrambled by control words, the stream of data containing the control words encrypted using a first key, and intended to cooperate with a detachable module for descrambling the data stream.
- the terminal is able to transmit the scrambled data stream to the detachable module across a first interface with the detachable module.
- the terminal is furthermore capable of receiving from the detachable module the decrypted control words which are encrypted using a second key before being transmitted across a second interface with the module.
- the terminal also comprises means for decrypting the control words received from the detachable module using the second key; and a descrambler capable of descrambling the digital data stream by using the decrypted control words.
- control words are also encrypted so as to travel at the level of the second interface, thereby further increasing the security of the assembly.
- the invention also relates to a module intended for cooperating with a digital terminal as described above, this module being able to receive from the terminal a scrambled digital data stream.
- the module is furthermore capable of extracting from the data stream the control words having served to scramble the digital data; of decrypting the control words; and of transmitting the decrypted control words (CW) to the terminal .
- the module is furthermore adapted for returning the scrambled digital data stream to the terminal without modifying the stream.
- the module is furthermore adapted for returning the scrambled digital data stream to the terminal by removing, relative to the data stream transmitted by the terminal, the data packets containing the control words.
- the module is able to receive the digital data stream across a first interface with the terminal, and it is furthermore capable of transmitting the decrypted control words to the terminal across a second interface with the terminal.
- the module is able to cooperate with a detachable security element for decrypting the control words, the module being capable of extracting from the digital data stream messages containing the encrypted control word; of transmitting the messages to a security element inserted into the module; of receiving from the security element the decrypted control words; and of transmitting the decrypted control words to the digital terminal with which it cooperates.
- the invention also relates to a module intended for cooperating with a digital terminal as described above, the module being able to receive from the terminal a scrambled digital data stream across a first interface with the terminal.
- the module is furthermore capable of extracting from the data stream the control words having served to scramble the digital data; of decrypting the control words and encrypting the control words using a second key; and of transmitting the encrypted control words to the terminal across a second interface with said terminal.
- the invention also relates to a method for descrambling a stream of digital data, scrambled by control words, which is received by a multimedia digital terminal, the control words being contained in the stream in encrypted form.
- the method comprises a first step consisting in transmitting the scrambled data stream to a detachable module. It furthermore comprises the steps consisting, for the detachable module, in extracting from the data stream the control words having served to scramble the digital data; in decrypting said control words; and in transmitting the decrypted control words to the terminal.
- the invention also relates to a method for descrambling a stream of digital data, scrambled by control words, which is received by a multimedia digital terminal, the stream of data containing the control words encrypted using a first key.
- the method comprises a first step consisting in transmitting the scrambled data stream to a detachable module.
- it furthermore comprises the steps consisting, for the detachable module, in extracting from the data stream the control words having served to scramble the digital data; in decrypting the control words; in encrypting the control words with using a second key; and in transmitting the encrypted control words to the terminal.
- the method furthermore comprises the steps consisting, for the terminal, in decrypting the control words using the second key; and in descrambling the digital data stream by using said decrypted control words.
- the invention also relates to a method for transferring control words between a module as described above and a digital terminal also described above. This method consists essentially: for the module, in sending a first identification object to the terminal; for the terminal, in sending, in response to the first object, a second identification object indicating whether the terminal is or is not able to receive the control words from the module; and - for the module, in the event of a positive response with the second object, in sending the control words enclosed in a third object.
- Figure 1 represents a digital terminal into which is plugged a DVB-CI module according to the prior art
- Figure 2 represents a digital terminal into which is plugged a module according to the principle of the invention
- Figure 3 diagrammatically represents a part of the common interface between a digital terminal and a module such as those of Figure 2; - Figure 4 illustrates a protocol for communication across the part of the common interface represented in Figure 3.
- FIG. 2 Represented in Figure 2 are a digital terminal 1 together with a module 2 connected to the terminal via an interface which is improved relative to the DVB-CI interface so as ensure better protection against copying at the level of this interface.
- the digital terminal 1 is a decoder receiving programmes from various service providers via cable or via a satellite antenna.
- a module 2 containing the specific elements of the conditional access system of a first service provider is connected to this decoder.
- the data stream TS'(D.EMB.) leaving the module 2 via the interface ITTS contains only data in scrambled form.
- the module 2 extracts only the control words CW from the stream TS(D.EMB.) received so as to transmit them, once decrypted, to the decoder.
- the descrambling of the data is performed only in the decoder 1 by virtue of a descrambler 16 contained in the decoder.
- the module 2 comprises a demultiplexer 22 which extracts the ECM control messages from the data stream TS(D.EMB.) received and which transmits them to a smart card 3 inserted into the module.
- the secure processor 30 of the smart card decrypts the control words CW contained in the ECM messages and it transmits them to the module 2.
- the control words CW are transmitted from the module 2 to the decoder 1 across the control interface ITCOM. The details of the transmission of the control words via the ITCOM interface will be explained later in conjunction with Figures 3 and 4.
- the module 2 extracts the ECM control messages from the data stream TS(D.EMB.) and replaces them, in the data stream TS'(D.EMB.) transmitted to the decoder, with stuffing packets.
- This variant is represented diagrammatically via the link 28 shown dashed.
- the demultiplex 22, contained in the module 2 extracts the video or audio data packets corresponding to the programme which the user wishes to view and it transmits them in the data stream TS'(D.EMB.) so that they are received directly by the descrambler 16 of the decoder.
- This variant is represented diagrammatically by the link 27 shown dashed.
- a smart card 4 which can be inserted into the decoder 1 and which belongs to the conditional access system of a second service provider.
- the decoder can comprise an integrated conditional access system for accessing the services of the second provider and furthermore comprise several connectors for modules 2 so as to access the services of several other providers.
- the decoder comprises a demultiplexer 15 and a descrambler 16.
- the access control software application CA' of the second provider is executed in the microcontroller 11.
- the stream TS(D.EMB.) is transmitted directly to the demultiplexer 15 via a link 19.
- This demultiplexer extracts the control messages ECM' and transmits them to the secure processor 40 of the smart card 4 which, with the aid of the key K', decrypts the control words CW' contained in the messages ECM' and sends them unenciphered to the descrambler 16, so as to descramble the services selected by the user.
- the data stream TS(D.EMB.) is transmitted from the decoder 1 to the module 2 so that the latter extracts the control words CW and retransmits them unenciphered to the decoder, but unlike the variants mentioned earlier, the stream TS(D.EMB.) is not returned via the ITTS interface to the decoder. Only the control words are transmitted to the decoder after having been decrypted by the module.
- the stream TS(D.EMB.) is for its part sent directly to the demultiplexer 15 of the decoder via the link 19 inside the decoder.
- the control words CW are not transmitted unenciphered across the ITCOM interface.
- the microcontroller 11 of the decoder 1 will therefore have to decrypt, using this second key, the control words received by the ITCOM interface before transmitting them to the descrambler 16.
- the module 2 and the decoder 1 generate, before a single control word travels through the ITCOM interface, a session key SSK by using the Diffie Hellman protocol, which is well known to the person skilled in the art. Thereafter, all the control words are encrypted in the module using the session key SSK, then are transmitted to the decoder in this encrypted form across the ITCOM interface before being decrypted, using the session key, in the decoder.
- the decoder 1 and the module 2 each contain a secret key K2 which is stored in a secure area of the decoder or of the module, for example in a secure processor.
- This secret key is unique for each decoder and if several modules are plugged into the decoder, they all contain the secret key of the decoder.
- control words are therefore encrypted with the secret key K2 in the module before being transmitted to the decoder via the ITCOM interface; they are then decrypted in the decoder using the key K2.
- the principle of the invention is particularly advantageous since it makes it possible to harness the demultiplexer and the descrambler which are already contained in the decoder so as to use them even when the conditional access system of another provider, contained in a detachable module, is used.
- demultiplexer and the descrambler components have been standardized within the framework of the DVB digital broadcasting standard in particular. Only the conditional access system (access control software, decryption algorithm and key, smart card, etc.) remains a proprietary system of the service provider.
- the ITCOM interface between the terminal (decoder) 1 and the module 2 uses a communication protocol which is represented diagrammatically in Figure 3 and which comprises several layers: a "Physical” layer (50, 60) which comprises the physical connector and low-level software for initializing the communication; a "Link” layer (51, 61) which forms the link between the Physical layer which deals only with bytes (8 bits of data) and the higher layer which can deal with much larger packets of data; a "Transport” layer (52, 62) which optimizes the occupation of the data stream by the various session in progress and which conveys the messages from the higher layer to the "Link” layer; a "Session” layer (53, 63) which opens, closes and manages the sessions in which the messages of the applications using the ITCOM interface are transmitted.
- a Communication protocol which is represented diagrammatically in Figure 3 and which comprises several layers: a "Physical” layer (50, 60) which comprises the physical connector and low-level software for initializing the communication; a "Link” layer (
- This resource CAS defines a certain number of specific objects intended for use by the access control applications of the modules connected to the terminal. It communicates with the four layers of the ITCOM interface across a " Standard API " (the abbreviation API standing for "Application Programming Interface”), the standard API defining other objects which are used by all the resources of the system.
- the access control application 65 of the module uses the objects defined by the resources of the terminal through a standard API. It was seen earlier that, according to the principle of the invention, the control words which are decrypted in the module 2 are thereafter transmitted to the terminal 1 across the ITCOM interface. In order that the control words may "cross" the various layers of the ITCOM interface, they must be enclosed in specific objects, comprehensible both to the application CA and to the resource CAS, which will be called "CPTS_CW()" hereinafter. Of course, when the control words are transmitted encrypted with the aid of a second key (SSK or K2) as in the fourth variant set forth above, they are enclosed, in this encrypted form, in the objects CPTS_CW() .
- SSK or K2 second key
- Figure 4 illustrates the protocol for communication between the access control application CA of the module and the resource CAS of the terminal which allows, according to the invention, protection against copying .
- the time scale has been represented by two downward vertical arrows.
- the application CA of the module checks that the resource CAS of the terminal does indeed support protection against copying over the ITCOM interface. To do this, the application CA sends during a step 100 an object "CPTS_identification() " which will be defined later. The resource CAS responds by sending, in step 101, an object "CPTS_identification_answer ( ) " which indicates whether the resource CAS does or does not support protection, against copying.
- the application CA of the module then regularly sends (steps 102a, 102b, 102i) the control words enclosed in the objects "CPTS_CW()" as and when they are decrypted by the module.
- Identification objects The function of the identification objects is to allow an access control application CA of a module supporting protection against copying to check whether the terminal to which the module is connected also supports protection against copying. That is to say, whether the resource CAS of the terminal possesses the functionality of protection against copying.
- the first object used is the following:
- the notation used here corresponds to that used in the aforesaid standard EN 50221 in which the objects are generally defined by means of a tag (here the "CPTS_identification_tag”) , of a length field (“Length_field ( ) ”) and of parameters which can take various values .
- the CPTS_identification_tag tag is a number defined on 24 bits and the notation "uimsbf" (stemming from "unsigned integer most significant bit first") signifies that this pertains to an unsigned integer whose most significant bits (highest order bits) are always situated first.
- the "Length_field() " field defines the length in terms of number of bytes of the parameters forming part of the object. Since here the object
- CPTS_identification ( ) contains no parameter, the length field is equal to zero.
- the second object used is the following:
- This "CPTS_identification_answer ( ) " object is used to indicate whether the resource CAS of the terminal does or does not support protection against copying according to the invention. It comprises a “CPTS_identification_answer_tag ( ) " tag and a length field which is equal to 1 since the object also comprises an "Identification_result” parameter defined on 8 bits. This parameter is for example a Boolean indicating whether or not protection against copying is supported by the resource CAS. Other parameters can be envisaged, for example to indicate a version number of the copy protection.
- the "CPTS_CW()" object comprises, in a first embodiment, parameters making it possible to send both an even control word (in “Even_CW”) and an odd control word (in “Odd_CW”). It can also comprise, in another embodiment, a parameter "CW”, on 128 bits, containing the control word and a parameter "Type_CW” on 8 bits, defining the type, even or odd, of the control word transmitted.
- the invention is not limited to the exemplary embodiments which are mentioned hereinabove.
- the person skilled in the art will be able to introduce any variant into the definition of the identification objects and control-word transmission objects by adding other parameters to these objects.
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU72814/00A AU7281400A (en) | 1999-09-23 | 2000-08-30 | Multimedia digital terminal and detachable module cooperating with the terminal comprising an interface protected against copying |
EP00960548A EP1214840A1 (en) | 1999-09-23 | 2000-08-30 | Multimedia digital terminal and detachable module cooperating with the terminal comprising an interface protected against copying |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR99/11901 | 1999-09-23 | ||
FR9911901A FR2799075B1 (en) | 1999-09-23 | 1999-09-23 | MULTIMEDIA DIGITAL TERMINAL AND DETACHABLE MODULE COOPERATING WITH SAID TERMINAL PROVIDED WITH A COPY PROTECTED INTERFACE |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001022724A1 true WO2001022724A1 (en) | 2001-03-29 |
Family
ID=9550174
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2000/008439 WO2001022724A1 (en) | 1999-09-23 | 2000-08-30 | Multimedia digital terminal and detachable module cooperating with the terminal comprising an interface protected against copying |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1214840A1 (en) |
AR (1) | AR028172A1 (en) |
AU (1) | AU7281400A (en) |
FR (1) | FR2799075B1 (en) |
WO (1) | WO2001022724A1 (en) |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002035763A2 (en) * | 2000-10-27 | 2002-05-02 | Scm Microsystems Gmbh | Module for secure transmission of data |
WO2003028287A1 (en) | 2001-09-21 | 2003-04-03 | Hughes Electronics Corporation | Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder |
EP1365586A1 (en) | 2002-05-22 | 2003-11-26 | Broadcom Corporation | System and method for protecting transport stream by copy protection encrypting the transport stream across common interface |
US6973576B2 (en) | 2000-12-27 | 2005-12-06 | Margent Development, Llc | Digital content security system |
DE102005060288A1 (en) * | 2005-12-15 | 2007-06-21 | Technisat Digital Gmbh | Digital free-to-air receiver conditional access system operating method, involves communicating receiver-external part with receiver via interface to read card, and verifying access authorization stored on card according to access system |
US7305560B2 (en) | 2000-12-27 | 2007-12-04 | Proxense, Llc | Digital content security system |
US7472280B2 (en) | 2000-12-27 | 2008-12-30 | Proxense, Llc | Digital rights management |
US7883003B2 (en) | 2006-11-13 | 2011-02-08 | Proxense, Llc | Tracking system using personal digital key groups |
US7904718B2 (en) | 2006-05-05 | 2011-03-08 | Proxense, Llc | Personal digital key differentiation for secure transactions |
US8171528B1 (en) | 2007-12-06 | 2012-05-01 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
US8352730B2 (en) | 2004-12-20 | 2013-01-08 | Proxense, Llc | Biometric personal data key (PDK) authentication |
US8996421B2 (en) | 2006-05-15 | 2015-03-31 | The Directv Group, Inc. | Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systems |
US9178693B2 (en) | 2006-08-04 | 2015-11-03 | The Directv Group, Inc. | Distributed media-protection systems and methods to operate the same |
US9225761B2 (en) | 2006-08-04 | 2015-12-29 | The Directv Group, Inc. | Distributed media-aggregation systems and methods to operate the same |
US9269221B2 (en) | 2006-11-13 | 2016-02-23 | John J. Gobbi | Configuration of interfaces for a location detection system and application |
US9325944B2 (en) | 2005-08-11 | 2016-04-26 | The Directv Group, Inc. | Secure delivery of program content via a removable storage medium |
US9613483B2 (en) | 2000-12-27 | 2017-04-04 | Proxense, Llc | Personal digital key and receiver/decoder circuit system and method |
US9967521B2 (en) | 2006-05-15 | 2018-05-08 | The Directv Group, Inc. | Methods and apparatus to provide content on demand in content broadcast systems |
US10769939B2 (en) | 2007-11-09 | 2020-09-08 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US10909229B2 (en) | 2013-05-10 | 2021-02-02 | Proxense, Llc | Secure element as a digital pocket |
US10971251B1 (en) | 2008-02-14 | 2021-04-06 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US10977631B2 (en) | 2006-05-15 | 2021-04-13 | The Directv Group, Inc. | Secure content transfer systems and methods to operate the same |
US11086979B1 (en) | 2007-12-19 | 2021-08-10 | Proxense, Llc | Security system and method for controlling access to computing resources |
US11095640B1 (en) | 2010-03-15 | 2021-08-17 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US11113482B1 (en) | 2011-02-21 | 2021-09-07 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
US11120449B2 (en) | 2008-04-08 | 2021-09-14 | Proxense, Llc | Automated service-based order processing |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US11258791B2 (en) | 2004-03-08 | 2022-02-22 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
US11546325B2 (en) | 2010-07-15 | 2023-01-03 | Proxense, Llc | Proximity-based system for object tracking |
US11553481B2 (en) | 2006-01-06 | 2023-01-10 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100409686C (en) * | 2004-09-28 | 2008-08-06 | 梁光海 | Remote controlled single channel outputting method for concentrating controller in digital analog TV-set |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1996006504A1 (en) * | 1994-08-19 | 1996-02-29 | Thomson Consumer Electronics, Inc. | Smart-card based access control system with improved security |
EP0706291A2 (en) * | 1994-10-03 | 1996-04-10 | News Datacom Ltd. | Secure access systems |
EP0923245A2 (en) * | 1997-12-09 | 1999-06-16 | Sony United Kingdom Limited | A digital video receiver, a conditional access module and a method of transmitting data therebetween |
-
1999
- 1999-09-23 FR FR9911901A patent/FR2799075B1/en not_active Expired - Fee Related
-
2000
- 2000-08-30 EP EP00960548A patent/EP1214840A1/en not_active Withdrawn
- 2000-08-30 WO PCT/EP2000/008439 patent/WO2001022724A1/en not_active Application Discontinuation
- 2000-08-30 AU AU72814/00A patent/AU7281400A/en not_active Abandoned
- 2000-09-20 AR ARP000104932A patent/AR028172A1/en active IP Right Grant
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1996006504A1 (en) * | 1994-08-19 | 1996-02-29 | Thomson Consumer Electronics, Inc. | Smart-card based access control system with improved security |
EP0706291A2 (en) * | 1994-10-03 | 1996-04-10 | News Datacom Ltd. | Secure access systems |
EP0923245A2 (en) * | 1997-12-09 | 1999-06-16 | Sony United Kingdom Limited | A digital video receiver, a conditional access module and a method of transmitting data therebetween |
Cited By (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002035763A3 (en) * | 2000-10-27 | 2002-07-04 | Scm Microsystems Gmbh | Module for secure transmission of data |
WO2002035763A2 (en) * | 2000-10-27 | 2002-05-02 | Scm Microsystems Gmbh | Module for secure transmission of data |
US6973576B2 (en) | 2000-12-27 | 2005-12-06 | Margent Development, Llc | Digital content security system |
US10026253B2 (en) | 2000-12-27 | 2018-07-17 | Proxense, Llc | Personal digital key and receiver/decoder circuit system and method |
US7472280B2 (en) | 2000-12-27 | 2008-12-30 | Proxense, Llc | Digital rights management |
US7305560B2 (en) | 2000-12-27 | 2007-12-04 | Proxense, Llc | Digital content security system |
US9613483B2 (en) | 2000-12-27 | 2017-04-04 | Proxense, Llc | Personal digital key and receiver/decoder circuit system and method |
EP1436943A4 (en) * | 2001-09-21 | 2005-05-18 | Hughes Electronics Corp | Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder |
JP2010193472A (en) * | 2001-09-21 | 2010-09-02 | Directv Group Inc | Method and apparatus for controlling paired operation of conditional access module and integrated receiver and decoder |
JP4659357B2 (en) * | 2001-09-21 | 2011-03-30 | ザ・ディレクティービー・グループ・インコーポレイテッド | Method and apparatus for controlling paired operation of conditional access module and integrated receiver and decoder |
JP2005505170A (en) * | 2001-09-21 | 2005-02-17 | ヒューズ・エレクトロニクス・コーポレーション | Method and apparatus for controlling paired operation of conditional access module and integrated receiver and decoder |
EP1436943A1 (en) * | 2001-09-21 | 2004-07-14 | Hughes Electronics Corporation | Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder |
WO2003028287A1 (en) | 2001-09-21 | 2003-04-03 | Hughes Electronics Corporation | Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder |
US7058803B2 (en) | 2002-05-22 | 2006-06-06 | Broadcom Corporation | System and method for protecting transport stream content |
US7594110B2 (en) | 2002-05-22 | 2009-09-22 | Broadcom Corporation | System and method for protecting transport stream content |
EP1365586A1 (en) | 2002-05-22 | 2003-11-26 | Broadcom Corporation | System and method for protecting transport stream by copy protection encrypting the transport stream across common interface |
US11258791B2 (en) | 2004-03-08 | 2022-02-22 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
US11922395B2 (en) | 2004-03-08 | 2024-03-05 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
US10698989B2 (en) | 2004-12-20 | 2020-06-30 | Proxense, Llc | Biometric personal data key (PDK) authentication |
US8352730B2 (en) | 2004-12-20 | 2013-01-08 | Proxense, Llc | Biometric personal data key (PDK) authentication |
US8886954B1 (en) | 2004-12-20 | 2014-11-11 | Proxense, Llc | Biometric personal data key (PDK) authentication |
US9298905B1 (en) | 2004-12-20 | 2016-03-29 | Proxense, Llc | Biometric personal data key (PDK) authentication |
US10437976B2 (en) | 2004-12-20 | 2019-10-08 | Proxense, Llc | Biometric personal data key (PDK) authentication |
US9325944B2 (en) | 2005-08-11 | 2016-04-26 | The Directv Group, Inc. | Secure delivery of program content via a removable storage medium |
US8433919B2 (en) | 2005-11-30 | 2013-04-30 | Proxense, Llc | Two-level authentication for secure transactions |
US9542542B2 (en) | 2005-11-30 | 2017-01-10 | Proxense, Llc | Single step transaction authentication using proximity and biometric input |
US9990628B2 (en) | 2005-11-30 | 2018-06-05 | Proxense, Llc | Two-level authentication for secure transactions |
DE102005060288A1 (en) * | 2005-12-15 | 2007-06-21 | Technisat Digital Gmbh | Digital free-to-air receiver conditional access system operating method, involves communicating receiver-external part with receiver via interface to read card, and verifying access authorization stored on card according to access system |
US11219022B2 (en) | 2006-01-06 | 2022-01-04 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network with dynamic adjustment |
US11800502B2 (en) | 2006-01-06 | 2023-10-24 | Proxense, LL | Wireless network synchronization of cells and client devices on a network |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US11212797B2 (en) | 2006-01-06 | 2021-12-28 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network with masking |
US11553481B2 (en) | 2006-01-06 | 2023-01-10 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US7904718B2 (en) | 2006-05-05 | 2011-03-08 | Proxense, Llc | Personal digital key differentiation for secure transactions |
US11157909B2 (en) | 2006-05-05 | 2021-10-26 | Proxense, Llc | Two-level authentication for secure transactions |
US8412949B2 (en) | 2006-05-05 | 2013-04-02 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US9251326B2 (en) | 2006-05-05 | 2016-02-02 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US10374795B1 (en) | 2006-05-05 | 2019-08-06 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US11551222B2 (en) | 2006-05-05 | 2023-01-10 | Proxense, Llc | Single step transaction authentication using proximity and biometric input |
US8838993B2 (en) | 2006-05-05 | 2014-09-16 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US10764044B1 (en) | 2006-05-05 | 2020-09-01 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US11182792B2 (en) | 2006-05-05 | 2021-11-23 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US10977631B2 (en) | 2006-05-15 | 2021-04-13 | The Directv Group, Inc. | Secure content transfer systems and methods to operate the same |
US9967521B2 (en) | 2006-05-15 | 2018-05-08 | The Directv Group, Inc. | Methods and apparatus to provide content on demand in content broadcast systems |
US8996421B2 (en) | 2006-05-15 | 2015-03-31 | The Directv Group, Inc. | Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systems |
US9225761B2 (en) | 2006-08-04 | 2015-12-29 | The Directv Group, Inc. | Distributed media-aggregation systems and methods to operate the same |
US9178693B2 (en) | 2006-08-04 | 2015-11-03 | The Directv Group, Inc. | Distributed media-protection systems and methods to operate the same |
US10943471B1 (en) | 2006-11-13 | 2021-03-09 | Proxense, Llc | Biometric authentication using proximity and secure information on a user device |
US9269221B2 (en) | 2006-11-13 | 2016-02-23 | John J. Gobbi | Configuration of interfaces for a location detection system and application |
US7883003B2 (en) | 2006-11-13 | 2011-02-08 | Proxense, Llc | Tracking system using personal digital key groups |
US11562644B2 (en) | 2007-11-09 | 2023-01-24 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US10769939B2 (en) | 2007-11-09 | 2020-09-08 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US9049188B1 (en) | 2007-12-06 | 2015-06-02 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
US8171528B1 (en) | 2007-12-06 | 2012-05-01 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
US8646042B1 (en) | 2007-12-06 | 2014-02-04 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
US11080378B1 (en) | 2007-12-06 | 2021-08-03 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
US11086979B1 (en) | 2007-12-19 | 2021-08-10 | Proxense, Llc | Security system and method for controlling access to computing resources |
US11727355B2 (en) | 2008-02-14 | 2023-08-15 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US10971251B1 (en) | 2008-02-14 | 2021-04-06 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US11120449B2 (en) | 2008-04-08 | 2021-09-14 | Proxense, Llc | Automated service-based order processing |
US11095640B1 (en) | 2010-03-15 | 2021-08-17 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US11546325B2 (en) | 2010-07-15 | 2023-01-03 | Proxense, Llc | Proximity-based system for object tracking |
US11669701B2 (en) | 2011-02-21 | 2023-06-06 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
US11132882B1 (en) | 2011-02-21 | 2021-09-28 | Proxense, Llc | Proximity-based system for object tracking and automatic application initialization |
US11113482B1 (en) | 2011-02-21 | 2021-09-07 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
US11914695B2 (en) | 2013-05-10 | 2024-02-27 | Proxense, Llc | Secure element as a digital pocket |
US10909229B2 (en) | 2013-05-10 | 2021-02-02 | Proxense, Llc | Secure element as a digital pocket |
Also Published As
Publication number | Publication date |
---|---|
AR028172A1 (en) | 2003-04-30 |
FR2799075B1 (en) | 2001-11-23 |
EP1214840A1 (en) | 2002-06-19 |
AU7281400A (en) | 2001-04-24 |
FR2799075A1 (en) | 2001-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2001022724A1 (en) | Multimedia digital terminal and detachable module cooperating with the terminal comprising an interface protected against copying | |
US6912513B1 (en) | Copy-protecting management using a user scrambling key | |
US7590242B2 (en) | Selective multimedia data encryption | |
CA2318992C (en) | Method and apparatus for recording of encrypted digital data | |
KR101081160B1 (en) | Method and apparatus for protecting the transfer of data | |
US7383561B2 (en) | Conditional access system | |
EP1151608B1 (en) | Method and apparatus for encrypted transmission | |
EP1169856B1 (en) | A global copy protection system for digital home networks | |
US7461396B2 (en) | System and method for providing a secure environment for performing conditional access functions for a set top box | |
JP5710273B2 (en) | Encryption system for satellite distribution television. | |
JP5162572B2 (en) | Conditional reception subunit, subunit and communication method | |
US20060182279A1 (en) | Secure conditional access port interface | |
US8060902B2 (en) | System for receiving broadcast digital data comprising a master digital terminal, and at least one slave digital terminal | |
HRP20010033A2 (en) | Method and apparatus for secure communication of information between a plurality of digital audiovisual devices | |
EP2373019A1 (en) | Secure descrambling of an audio / video data stream | |
CN104303511A (en) | TV receiver device with multiple decryption modes | |
US20020044656A1 (en) | Interfacing a conditional access circuit to a digital device using input and output stream switching | |
KR20060054419A (en) | Copy-protecting applications in a digital broadcasting system | |
US20100082831A1 (en) | Loadable and modular conditional access application | |
KR101980928B1 (en) | Method, cryptographic system and security module for descrambling content packets of a digital transport stream | |
KR20070027135A (en) | Multi-descrambeler system and method in digital broadcasting receiver | |
KR101743928B1 (en) | Operating system of broadcast contents protection technologies and its operating method in broadcast receiver environment | |
KR20080069789A (en) | Broadcast receiver and method for authentication of copy protection | |
ZA200100325B (en) | Method and apparatus for secure communication of information between a plurality of digital audiovisual devices. | |
WO2011064672A1 (en) | Method for transfer of access criteria for multi-domain and trans-domain distribution of video and other media content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2000960548 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2000960548 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000960548 Country of ref document: EP |