CA2237293A1 - Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers - Google Patents

Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers Download PDF

Info

Publication number
CA2237293A1
CA2237293A1 CA002237293A CA2237293A CA2237293A1 CA 2237293 A1 CA2237293 A1 CA 2237293A1 CA 002237293 A CA002237293 A CA 002237293A CA 2237293 A CA2237293 A CA 2237293A CA 2237293 A1 CA2237293 A1 CA 2237293A1
Authority
CA
Canada
Prior art keywords
key
packets
customer
recited
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002237293A
Other languages
French (fr)
Inventor
Anthony John Wasilewski
Douglas F. Woodhead
Gary Lee Logston
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Scientific Atlanta LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/580,759 external-priority patent/US5870474A/en
Application filed by Individual filed Critical Individual
Priority claimed from PCT/US1996/013743 external-priority patent/WO1997024832A1/en
Publication of CA2237293A1 publication Critical patent/CA2237293A1/en
Abandoned legal-status Critical Current

Links

Abstract

Methods and apparatus are described for ensuring that programs comprising at least one of video, audio, and data that are requested by a customer from a service provider (SP) (110) via an interactive information services system (10), which transmits the requested programs in program bearing packets to a set top unit (STU) (90) associated with the customer (130), are accessible by only authorized customers (130). The apparatus is positioned between the SP
(110) and the STU (90) and comprises: means for receiving the program bearing packets in a first network protocol from a first data link (40) and removing the packets from the first network protocol; means for adding conditional access to the program bearing packets; and, means for re-encapsulating the program bearing bpackets in a second network protocol and outputting the program bearing packets over a second data link (50). Methods and apparatus for applying conditional access are described that comprise encrypting selected program bearing packets with a first key; encrypting the first key with a second key; and, encrypting the second key according to a public-key encryption algorithm using a public key corresponding to a private key stored within the STU (90) associated with the customer (130).

Description

W O 97/24832 PCTrUS96/13743 METHOD AND APPARATUS FOR PROVIDING CONDITIONAL ACCESS IN
CONNECTION-ORl~Nl~, INTERACTIVE NETWORKS WITH A
MULTIPLICITY OF SERVICE PROVIDERS
CROSS-R~K~ TO ~ I~TED liPPLIC~TIONS
5This application claims priority o~ earlier ~iled U.S. provislonal application Serial No. , filed December 4, 1995, entitled "An Apparatus ~or Providing Conditional Access in Connection-Oriented, Interactive Networks With a Multiplicity o~ Service Providers.
(Attorney Docket No.: T-598).
F~ELD OF THE lNv~NllON
The present invention relates to a control system for providing interactive information services, such as video, audio, library, interactive games, and the like over a digital network. Particular video applications include "movie on demand," on-line data retrieval, and home shopping. More particularly, the invention relates to a control system ~or providing secure transmission of these information services between a service provider and a customer's set top unit over a digital network.
RA~K~7ROIn~D OF I~IE lNVhl~ ON
Recent advances in digital signal processing techni~ues and, in particular, advancements in digital compression techniques, have led to an abundance of proposals for providing new digital services to the customer's home via existing telephone and coaxial cable lines. For example, proposals have been made to provide hundreds of CATV channels to customers by compressing digital video, transmitting the compressed digital video CA 02237293 1998-0~-11 W O 97124832 PCT~US96/~3743 over conventional coaxial CATV cables, and then decompressing the video at the customer's set top unit.
Another proposed application of this technology is a "movie on demand" video system in which a customer communicates directly with a video service provider via the telephone lines or coaxial CATV cables to request a particular video program from a video library, and the requested video program is routed to the caller's home via the telephone lines or via the coaxial CATV cables for immediate viewing.
Such an exemplary system typically has three distinct segments: (1) a service provider (SP), which provides the video, audio, interactive games and the like (collectively referred to hereinafter as "programs~l) to the system; (2) a customer, who purchases the programs from the service provider; and, (3) a network operator, which provides a transmission path or connection between the SP
and the customer for delivery of the programs. A layer of complexity is added to the operation and design of the system if the network operator is defined as a telephone company by the Federal Communications Commission (FCC). In such a case, the network operator is subject to regulation under the jurisdiction of the FCC. The system will then be further categorized into Level 1 services (L1) and Level 2 services (L2). Level 1 services provide the information session connection and define the portion of the system responsible for setting up and maintaining interactive communication sessions between customers and SPB. Level 1 services are provided by the network operator and are regulated by the FCC. Level 2 services, on the other hand, define the portion o~ the system responsible for providing the programs requested to the Ll portion of the system from the SP and for terminating the service at the customer end of the network. A provider of Level 2 services is defined by the FCC as an enhanced services provider and is not regulated by the FCC. Significantly, these FCC regulations limit the control a Level 1 services provider may have over Level 2 services.

CA 02237293 l998-0~-ll 2 PCTrUS96/13743 In a Level 1/Level 2 system, which is under the jurisdiction o~ the FCC, the SP resides in Level 2 and the control that the SP can exercise over Level 1 services is restricted. However, in any system where a SP is delivering programs to a customer over a network, the SP has a need to prevent the unauthorized access to the programs provided to the customer For e~amp~e, a non-subscriber may attempt to illegitimately receive the programs intended ~or the use o~
paying subscribers. This protection of programs through the prevention of unauthorized acce6s i8 rei~erred to as "conditional access.~ As used herein the terms "conditional access" and "conditional access layer" broadly refer to the control mechanisms, data structures and comm~n~.~ that provide ~or selective access or denial of specific services.
Prior art systems have provided conditional access by encrypting the programs at the SP site and decrypting the programs at the customer site.
For example, Lee et al., U.S. Patent No. Re.
33,189, discloses a system using an encryption mechanism ~or providing conditional access in a satellite television system and is hereby incorporated by reference. In Lee, a program is scrambled at a SP site using a frequently changing random number. The random numbers are encrypted with a key and broadcast along with the program to customer sites. Customers who have paid receive the key, encrypted with the unique ID that is embedded in their set top unit (STU)-. These customers' STUs can decrypt the key using the unique ID embedded within it. The customers' STU can then decrypt the encrypted random numbers, as they are broadcast, and use the random numbers, along with the key, to decrypt the program. As noted above, the key in the Lee invention must be securely transmitted; otherwise, an unauthorized user could get access to the key and gain access to the broadcast programs. Lee protects the key by using the ~ 35 unique ID o~ the STU to encrypt it. Such a technique works fine in a broadcast environment where there is a single broadcaster to multiple users. In that environment, the CA 02237293 1998-0~-ll broadcaster can take adequate measures to protect the list of valid customer STU IDs. However, in a telephone architecture regulated by the FCC, as described above, multiple service providers (i.e., broadcasters) must have access to the multiple users. In such an environment, the list of unique STU IDs is vulnerable to discovery by unauthorized parties, and the security of the system may be breached. Additionally the Lee system is appropriate ~or a broadcast environment in which the SPs have the only reasonable means to address the STUs. Therefore, the system is not susceptible to compromise by unauthorized users addressing the STUs. However, in a digital network environment where STUs are uniquely addressable, and multiple SPs have access to multiple STUs, an unauthorized user could put information on the network addressed to individual STUs and thereby compromise the system.
Applicants have recognized that a conditional access system in a digital network environment must have a mechanism that allows the STU to authenticate the identity of the SP.
Thus, applicants have recognized that an improved encryption technique is needed.
Moreover, while encryption has provided conditional access, the problem o~ where to perform the conditional access in an FCC regulated system remains unresolved. Applicants have recognized that a solution that performs the conditional access within the L1 portion of the system is unnecessarily complicated by FCC regulation.
Applicants have recognized that conditional access should be performed while a program is still in control of the Level 2 service provider, i.e., before it is delivered to the Ll portion of the system. Access to the program and vital conditional access information can be closely controlled by a service provider. Unfortunately, the file server equipment currently available to service providers does not provide the necessary functionality to perform conditional access before a program is output from the file server. As a result, there is a need for method and WO 97/2483~ PCT~US96/13743 apparatus to provide conditional access to a program after it exits a file server, but before it enters the L1 portion of the system.
The problem is complicated further when considered in the context of a typical digital network environment. In such an environment it is expected that the SPs will store programs on file servers in the form of Moving Picture Expert Group (MPEG-2) System~ transport packets, as defined in MPEG-2 Systems International Standards ~e~erence (ISO/IEC
~TC1/SC29/WG11 N0801, November 1994, ISO Reference No.
13818-1), which is hereby incorporated by reference.
Importantly~ although the MPEG-2 Systems International Standards Reference does not standardize on a particular method of conditional access, it does contemplate the addition of conditional access to the MPEG-2 transport packets. Thus, to conform to the MPEG-2 standard, it is necessary that conditional access be added to programs at the MPEG-2 transport packet layer rather than at a higher network protocol layer. However, when a program leaves a service provider's file server, it will not be in a convenient ~ormat for applying conditional access. Rather, the program, in the form of MPEG-2 transport packets, will leave the ~ile server enveloped in a first network protocol.
Additionally, in some applications, the packets may then need to be re-mapped into a second network protocol to con~orm to the network protocol provided by the network operator. Thus, in this context there is a need for method and apparatus for removing the MPEG-2 transport packets of a particular program from a first network protocol, providing conditional access to the MPEG-2 transport packets, and then mapping the MPEG-2 transport packets back into the ~irst network protocol or into a second network protocol.
SU~ RY OF 1~D3 l~V~N-llO~
The present invention meets the needs discussed above by providing method and apparatus between the SPs and the Level 1 services provider that accepts programs destined for an STU in the ~orm of MPEG-2 transport packets enveloped CA 02237293 1998-0~-ll W O 97124832 PCTrUS96/13743 in one of a plurality of network protocols. According to the present invention, the packets are removed from a first network protocol. Conditional access layers are applied to the packets. A~ter applying the conditional access layer~, the pac~ets are encapsulated and output in a second network protocol destined ~or the STU.
According to an aspect o~ the present invention a method of providing conditional access to selected program is provided. Packets representing a program re~uested by a customer having an STU are selected. Those program bearing packets are encrypted according to a first encryption algorithm using a first key. The first key used to encrypt the program is, in turn, encrypted according to a second encryption algorithm using a second key. The first keys are transported in packets to the customer's STU along with the program packets. The second key is, in turn, encrypted using a public-key cryptographic technique such that the public key used in the encryption corresponds to the private key of the customer's STU. The encrypted second key is then transported via packets to the STU along with the program and first key packets.
According to another aspect o~ the present invention the apparatus provides means for receiving program bearing packets in a first network protocol from a first data link and removing the packets from the first network protocol. The apparatus selects all packets comprising a particular program re~uested by a customer. Conditional access is then applied to the requested program at the packet layer in accordance with the method described above.
The apparatus then encapsulates all packets in a second network protocol and outputs them over a second data link for delivery to the customer~s STU.
According to a further aspect o~ the present invention, method and apparatus are provided for generating a message authentication code compri~ed o~ a hash o~ the first key and the second key, such that the STU can determine if the packets bearing the first key has been CA 02237293 1998-0~-11 WO 97/2~832 PCTrUS96/13743 tampered with during transmission. Additional method and apparatus are provided for applying a digital signature to the encrypted second key, such that the authorized customer can determine the identity of the provider of the encrypted second key, thereby preventing unauthorized users ~rom addressing STUs.
BRIEF DESCRIPTION OF TEE D~AWINGS
The foregoing summary, as we~l as the ~ollowing detailed description of the preferred embodiment, is better understood when read in conjunction with the appended drawing~. For the purpose of illustrating the invention, there is shown in the drawings an embodiment that is presently preferred, it being understood, however, that the invention is not limited to the specific methods and instrumentalitieS disclosed. In the drawings:
Figure 1 illustrates an exemplary digital video distribution system in which the present invention may be employed.
Figure 2 is a block diagram providing further details of a server access and broadband encrypter re-mapper in accordance with a presently preferred embodiment of the invention.
Figure 2A is a block diagram illustrating further details of a presently pre~erred embodiment of an FDDI input card.
Figure 2B i8 a block diagram illustrating further details of a presently preferred embodiment of a SONET-ATM
output card.
Figure 2C is a block diagram illustrating further details of a presently preferred embodiment of a conditional access card.
Figure 2D is a block diagram illustrating the ~ operation of the control card.
Figure 3 is a ~unctional block diagram illustrating the conditional access scheme provided in accordance with the present invention.

CA 02237293 1998-0~-ll W O 97/24832 PCT~US96/13743 Figure 3A is a functional block diagram illustrating the process of message authentication of control words in accordance with the present invention.
Figure 3B is a functional block diagram illustrating the process of adding a digital signature to an MSK in accordance with the present invention.
Figure 4 graphically illustrates the structure and content of an exemplary MPEG-2 transport packet.
Figure 5 graphically illustrates the mapping of MPEG-2 transport packets into ATM cells in accordance with the present invention.
Figure 6 graphically illustrates the mapping of MPEG-2 transport packets into an FDDI frame in accordance with the present invention.
Figure 7 graphically illustrates the mapping of MPEG-2 transport packets into a DS-3 frame in accordance with the present invention.
Figure 8 graphically illustrated the mapping of MPEG-2 transport packets into a UNISON frame in accordance with the present invention.
Figure 9 graphically illustrates the transport overhead structure utilized in the UNISON-1 STS-3c frame 8 tructure.
Figure 10 graphically illustrates the Synchronous Payload Envelope ~SPE) structure u~ed for transmitting MPEG-2 transport packets in accordance with the UNISON-1 STS-3c frame structure.
Figure 11 illustrate6 a functional block diagram of an exemplary set top unit implementing the conditional access method of the present invention.
Figure 12 i8 a functional block diagram illustrating the context and operation of the Conditional Access ~anager.
DET~TT.Rn DES ~ IPTION OF PREFE ~ ED Ei~BODIME~NTS
Referring to the drawings wherein like numerals indicate like elements throughout, there is shown in FIGURE
1 a block diagram of the components of an exemplary digital CA 02237293 1998-0~-ll W O 97/24832 PCTrUS96/13743 information distribution system 10 ('~distribution system~) in which the present invention may be incorporated. A
similar system is described in U.S. Patent No. 5,481,542, ~ which i9 assigned to the same assignee as the present invention and ls hereby incorporated by reference in its entirety. The distribution system 10 provides a mechanism whereby data, such as compressed digital video data from a service provider (SP) 110, is transmitted over a broadband transmission network under the control of a network operator 120 to a customer 130 for presentation to the customer~s STU
90. As used herein, the term set top unit refers to any customer device capable of receiving and decoding digital services, such as personal computers, home control terminals, decoders and the like. In the case of a video service, for example, the received information could be displayed on the customer's television or computer screen.
A bi-directional communication path is also established and maintained between the SP 110 and the customer 130 by the network operator 120, which allows the customer 130 to interact with the service provider. For example, the customer 130 may wish to select programs from a menu, control the playback of a program, or interact with a video game.
Various aspects of the distribution system 10 incorporating the present invention are described below.
First, an overview of the components o~ the distribution system 10 are described. Following the overview, detailed information concerning the various components of the distribution system 10 that incorporate the present invention is provided.
I. System Overview When a customer 130 requests a program, the - request is routed from the customer's STU 90 through a network access node 80 to the network control and management computer (NCMC) 100. The NCMC 100 then provides a communication connection between a particular service provider 110a, 110b and the customer 130. To establish the CA 02237293 1998-0~-11 connection, the NCMC loo ensures that bandwidth is available on the digital network 70 and the network access node (N~N) 80. Thereafter, the NCMC 100 passes the customer request to the requested SP 110 via server gateway 61. The server gateway 61 handles communications with various billing agencies to determine the customer' 5 eligibility to receive the requested program and to determine the conditional access requirements for the requested program. An SP stores programs on a file serVer 60 in the form of Moving Picture Experts Group (MPEG-2) Systems transport packets, containing compressed digital video and audio data as well as other digital service information. The requested MPEG-2 transport packets are then output over data link 40 encapsulated in a network protocol. Ultimately, the packets are to be transmitted through the digital network 70 to a NAN 80 and then to the customer's STU 90. The service providers 110 want to ensure that programs entering the digital network 70 are viewed only by the customers who have been authorized by the server gateway 61. Thus there is a need to provide conditional access to programs before those programs enter the digital netwo~k 70. Accordingly, one aspect of the present invention, apparatus 20 and 30, re~erred to herein as Service Access and Broad Band Encrypter Re-mapper (SABER) 20 and Conditional Access Manager 30, are provided between the SP 110 and the digital network 70 to provide a means ~or adding conditional access to the program to be transmitted.
In particular the S~3ER 20 receives the MPEG-2 transport packets from the SP 110, via data link 140, encapsulated in the network protocol of that link. According to the present invention the SABER 20 extracts the MPEG-2 transport packets, adds conditional access, and then re-encapsulates the packets in a second protocol (which may be the same or different from the first protocol) ~or introduction into digital network 70. The CAM 30 provides the SABER with information necessary to selectively apply the conditional access to the MPEG-2 transport packets. The CAM 30 receives the conditional access requirements and unique PID

CA 02237293 1998-0~-11 W O 97t24832 PCTrUS96113743 assignments for the requested program from the SP via the server gateway 61.
The second network protocol, that of data link 50, may be the same as or dif~erent from the ~irst network protocol of data link 40. For example, data link 40 may conform to an FDDI network protocol, while data link 50 may con~orm to an ATM network protocol, or both data links 40, 50 may con~orm to an ATM network protocol. Among the protocols pre8ently anticipated ~y the SABER 20 are SONET-ATM, FDDI, DS-3 and UNISON-l, all o~ which can be used to transfer Movin~ Picture Experts Group (MPEG-2) Systems transport packets through data link 40 or data link 50.
However, the network protocols listed and described herein are merely illustrative, and should not be construed as limiting the invention to those protocols listed, other protocols, ~or example, a proprietary protocol, could function equally well.
Significantly, if the digital network 70 were inherently secure (for example, a completely fiber network) the SABER 20 could be located elsewhere in the system 10.
In such a secure network, the SABER 20 might be located at the opposite end of the digital network 70, between the digital network 70 and the NANs 80.
Network control and management computer (NCMC) 100 manages sessions between the STUs 90 and the SPs 110. Among its duties, the NCMC 100 is responsible for provisioning the NAN 80, provisioning the STUs 90, providing routing information to the digital network 70 when appropriate, and for information session management between the ST~s 90 and the SPs 110. In providing the session management, either the STUs 90 or the SPs 110 may send requests ~or information service connections to the NCMC 100. After receiving a request, the NCMC 100 determines if there are resources available on the network 70 for transporting the requested services and, if so, establishes the requested service connection from the SP 110 to the STU 90. The NCMC 100 then sends the service in~ormation to both the STU 90 and the SP

CA 02237293 1998-0~-11 W 097/24832 PCTrUS96113743 110 to allow them to connect to the network and to begin the requested interactive information service. The NCMC 100 may establish sessions in the manner described in U.S. Patent No. 5,481,542, which is incorporated herein by reference in its entirety.
II. Service Provider Complex The SPs 110 control the system that provides programs to the customer. To provide these programs, the SP
employs one or more ~ile servers 60, a server gateway 61, and in accordance with the present invention, a conditional access manager (CAM) 30 and a SABER 20. The file server~
store programs in MPEG-2 transport packet format for delivery to customers. That is, when a customer requests a program from the file ~erver 60, the file server 60 outputs MPEG-2 transport packets bearing the requested program for delivery over the digital network 70. However, before relinquishing control over a program, an SP 110 would like to diminish the possibility that the program will be diverted to an unauthorized user. In particular the SP 110 would like to add a layer of conditional access to the program to ensure that only the customer that re~uested the program will have the ability to view it. Currently available file server equipment does not have the capability to add the necessary conditional access layers. If the packets output by the file server 60 are transmitted without conditional access over the digital network 70 and are intercepted by an unauthorized user in possession of a STU
90 capable o~ decoding MPEG-2 transport packets, that unauthorized user could have access to all transmitted programs.
According to the present invention, conditional access layers are added to the MPEG-2 transport packets by the SABER 20 in conjunction with the CAM 30. The CAM 30 and the SABER 20 coordinate the process of adding conditional access to the transport packets o~ a given program via an ethernet link 140. Generally, the process of adding conditional access involves encrypting the contents of -CA 02237293 1998-0~-ll W O 97/24832 PCTrUS96/13743 transport packets and the corresponding keys and ensuring that that information is provided to the STUs 90.
Concurrently, the CAM 30 keeps track of program level - information (e.g., PID maps and higher levels of encryption keys) which it periodically provides to the SABER 20.
- Additionally, the CAM 30 periodically generates other data (e.g., system-wide pay-per view access, copy protection information, and the like) that it must deliver to the STU
go. That information is placed in Entitlement Control Messages and Entitlement Management Message that are carried in MPEG-2 transport packets which are multiplexed into the stream o~ program bearing MPEG-2 packets. A method ~or providing conditional access information to STUs is described in more detail in Wasilewski, U.S. Patent No.
5,420,866, which is assigned to the same assignee as the present invention and is hereby incorporated by reference in its entirety. Those packets generated by the CAM 30 are transmitted from the CAM 30 to the STU 90 via the SA~3ER 20, where they are mapped into the network layer protocol of data link 50.
III. The Conditional Access Model o~ the Present Invention The inner workings of the SABER 20 and the CAM 30 are better understood with re~erence to a conditional access model. To that end, a presently preferred embodiment of the conditional access model of the present invention is presented here be~ore embarking on a hardware level description o~ implementation details of that model. Figure 3 presents a functional diagram of the presently preferred conditional access model.
The present invention provides three functional levels of protection: (1) program encryption, (2) control word encryption and authentication, and (3) entitlement message encryption and authentication. At the first level, the program bearing MPEG-2 transport packets are encrypted ~ 35 using random number generated keys, referred to hereina~ter as control words. At the second level, the control words are encrypted using a second randomly generated key. This CA 02237293 1998-0~-ll W O 97/24832 PCTrUS~6/13743 second key i8 referred to hereina~ter as a multi-session key (MSK). At the third level, the multi-session key is encrypted using a public key cryptography technique.
The first level of encryption--program encryption--is indicated in Figure 3 by bo~ 154. Preferably, the first layer i8 implemented using a private-key cryptographic techni~ue. As indicated the program encrypter receives MPEG-2 transport packets as an input, along with a control word, and outputs encrypted MPEG-2 transport packets. The encrypter may employ any suitable encryption algorithm, such as DES or Triple DES. Significantly, in the present embodiment, the header in~ormation in MPEG-2 transport packets is never encrypted; conditional access i6 applied only to the payload portions of the MPEG-2 transport packets. Thus, an STU 90 can read the PIDs and other overhead information carried in the MPEG-2 transport packets without the need to decrypt the packets.
The control words must be transferred to the STU
9o to enable the eventual decryption of the program. During this transfer, the control words are vulnerable to unauthorized access. Thus, at the second level of the encryption model, the control words are encrypted using the MSK to prevent an unauthorized user from gaining access to them and, thereby, to the programs they were used to encrypt. This is indicated in box 153, which shows the control words as an input, along with the MSK, and encrypted control words as an output.
The MSKs must also be securely trans~erred to the STU 90. The third level of the encryption model supports this secure transfer. In accordance with another aspect of the present invention, this third level of encryption uses a public-key encryption algorithm to encrypt the MSKs, which obviates the need to securely transfer an endless hierarchy of keys from the SP 110 to the STU 90. According to this technique, each STU 90 has a private key and a corresponding public key. As indicated by box 155, the public key for a particular STU 90 is used to encrypt the MSK. Moreover, as CA 02237293 l998-0~-ll W 097/24832 PCT~US96~3743 will be described in detail below, a digital signature technique is used to further guarantee the security o~ the conditional acces~ system. As a result, the MSK can be ~ securely transferred to the STU 90. No further encryption s levels are necessary, because the STU 90 already contains the private key that corresponds to its public key, which the STU 90 can use to decrypt the MSK.
Of all the keys used in the present invention, the control words, used in the first level of encryption, change most o~ten, e.g., e~ery few seConds. This frequent key changing is designed to thwart attempts by unauthorized users to compromise the encryption algorithm by discovering the key. Such a design is effective because even if an unauthorized user came into possession of a control word, that control word would expire before any advantage could be gained. However, because the control words change often and the encryption must be performed quickly to keep up with the high program data rates, a privat-e key encryption scheme with a relatively small control word i9 used (e.g., DES with a 56-bit key).
The conditional access solution of the present invention overcomes an additional obstacle--only a single interactive connection exists between the SP 110 and the STU
90, and that connection is assumed not to be secure. As a result of having a single interactive connection, the SP 110 must send the encryption keys along with the program to the STU 90 over that same connection. Any assumptions about the insecurity of the network also apply to the transmission of keys from the SP 110 to the STU 90. In order to provide adequate security to the transmission of programs and overcome the single connection obstacle, the control words must also be protected from unauthorized access. Thus, at the second level of the conditional access model, the control words are themselves encrypted using a second encryption algorithm. Significantly, the data rates required to transmit encrypted control words to the STU 90 are much lower than the data rates required to transmit the CA 02237293 1998-0~-11 W O 97/24832 PCTrUS96/13743 program data. Consequently, the keys can be encrypted with a longer key and a more robust encryption algorithm (e.g., Triple DES with a 112 bit key).
As noted, the system must deliver the control words to the STU 90 over the single interactive connection.
Accordingly, the control words are inserted into MPEG-2 transport packets for transmission to the STU 90. The control words are delivered to the STU 90 in the form of entitlement control messages (ECM). Such messages are used to transmit control words to the STUs 90 along with authentication information, such as a message authentication code. Each ECM comprises header information, and the ECM
payload, which contains the control word and a message authentication code.
Message authentication is another mechanism provided at the second conditional access level, ensuring that the ECM data is not tampered with during transmission.
In the present embodiment, this authentication is accomplished by use of a message authentication code (MAC), which is transmitted with the encrypted control words ln the ECM. The mechanism is illustrated in Figure 3A.
As shown in Figure 3A, in the SABER 20, the clear (alternately referred to as non-encrypted) control word is encrypted with the MSK as signified by box 153. At the same time, the clear control word, other data (e.g., system-wide pay-per view access, copy protection, and the like), and the MSK are concatenated together (1002). This concatenation is then hashed, as indicated at box 1004, using a one-way hash algorithm, such as the well-known Message-Digest (MD5) algorithm, to produce a MAC. The MD5 hash produces an output value from which it is computationally infeasible to discover the input value to the hash algorithm. The MAC is appended to the encrypted control word, as indicated at 1006. The producer o~ the MAC (e.g., the SABER 20) must know both the pre-encrypted control word and the MSK to produce a proper output hash value. The resulting hash CA 02237293 l998-0~-ll W O 97/24832 rCT~US96113743 value is transmitted to the STU 90, along with the encrypted control word, in the ECM.
At the STU 90, the MAC process is reversed be~ore releasing the control word for use in decryption. The encrypted control word i8 parsed from the ECM and decrypted - with the MSK (box 1008), which was transmitted to the STU 90 (as indicated by dashed lines in Figure 3A) through a mechanism described in detail below. The now clear control word and the MSK are concatenated and hashed (box 1010) in similar fashion to the techni~ue used in the SABER 20 prior to transmission. This hash value is then compared to the MAC received in the ECM (1012). I~ the two values match then the control words are authorized for use by the STU 90 in decrypting the program.
The ECMs (i.e., encrypted control words and corresponding MACs) may be carried in MPEG-2 transport packets in one of two ways: (1) as part of the adaptation ~ields within the MPEG-2 transport packets that carry the program data that the control words were used to encrypt, or (2) as separate MPEG-2 transport packets. In the second case, a unique PID is assigned to those packets, and they are multiplexed into the stream of packets bound for the STU
90 .
In the third encryption level, because the rate necessary to transmit the MSKs to the STU 90 is lower than the control word transmission rate (the MSK only changes on the order o~ once a day to once a month), the MSK can be subjected to enhanced protection. Moreover, the consequences of a discovered MSK may be greater than the consequences of a discovered control word. This is so because the MSK r~m~;ns valid for a much longer duration and may apply to multiple programs. Thus, a more robust encryption algorithm is prudent. According to the present invention, a public-key encryption algorithm is utilized for this third level encryption.
According to the present invention, each STU 90 has a public key/private key pair. The private portion of CA 02237293 l998-0~-ll W 097/24832 PCTrUS96/13743 the key pair is stored securely within the STU 90 and is never disclosed publicly. A variety of means can be employed to ensure that the public key i8 not publicly disclosed. For example, the private key can be implanted during manufacture into a tamper resistant processor in the STU ~0. All record5 of the private key for that STU 90 can then be destroyed to guarantee that no unauthorized users will discover the private key. Alternatively, the STU 90 can contain an algorithm that generates a public key/private key pair. In thi5 5cheme, when the STU 90 is started for the very first time, it would generate a key pair, secure the private key portion internally, and provide the public portion as an output. As a consequence, the only record of the private key will remain securely stored within the STU
90, without any record of the private key ever being known external to the STU 90.
The public key corresponding to a particular private key is used to encrypt messages (e.g., MSKs) in the CAM 30 prior to transmission to the STUs 90. The public key can be made widely available, without compromising the integrity of the conditional access system. In a Level 1/Level 2 architecture in which multiple SPs 110 may have access to the multiple STUs 90, the wide availability of public keys allows the multiple SPs to share a single STU 90 without concern that the third level key will become known to unauthorized users. But, because the list of public keys are widely available to multiple SPs 110, a method of sharing key information among the SPs 110 is required.
According to the presently pre~erred embodiment of the present invention, a conditional access authority will maintain the integrity of the public keys and distribute the public keys to the SPs 110 as needed. The conditional access authority maintains a public key database with which it is trusted to ensure that every public key corresponds to the proper STU 90. Otherwise, if the integrity o~ the conditional access authority is compromised, an unauthorized user could falsify a key entry in the tables maintained by CA 02237293 1998-0~-11 W O 97/24832 PCT~US96/13743 the conditional access authority, which would in turn provide a false public key to the SPs 110. Thus, messages intended to be transmitted by an SP 110 to an authorized STU
90 could be diverted by the unauthorized uqer. The conditional access authority may also maintain a public key reference ~or all the SPs llo. So that STUs 90 may be provisioned with SP 110 public keys in verifying SP 110 digital signatures.
As a final part of the conditional access system, a strategy for prohibiting unauthorized users from sending entitlement management messages (i.e., messages that carry the MSKs to a particular STU 9o) to the STUs 90 is provided.
The public key for a particular STU 90 may be widely available and susceptible to discovery by unauthorized users. Without some additional protective mechanism, an unauthorized user could obtain the public key for one of the STUs 90 and delivered a message to it; the STU 90 would accept the message and decrypt it. False MSKs could thus be sent over the digital network 70, compromising the integrity of the system. In order to prevent such an occurrence, a digital signature is used, which authenticates the sender of the message as an authorized SP 110. Specifically, before transmission, a digital signature is used to "sign" a hashed message with the SP's 110 private key. After reception of that message, the STU 90 uses the SP's 110 public key to verify that the message is authentic.
This digital signature me~h~nl.qm is illustrated in Figures 3B. At the transmission end of the system (i.e., at the CAM 30), a clear EMM (which may contain an MSK or other STU 90 specific information) to be sent to an STU 90 is hashed (box 1020) using a one-way hash function, such as the well-known MD5 hash algorithm. The output hash value is - then encrypted using the private key of the SP 110 that sending the EMM. Encryption is performed using a well-known public-key encryption algorithm, such as RSA. This process creates a digital signature token that is appended to the clear EMM as indicated at 1023. The digitally signed EMM is W O 97/24832 PCT~US96/13743 then encrypted with the public key of the STU go that is to receive the message. This signed, encrypted EMM is then transmitted to the STU 90 via digital network 70.
The EMM is addressable to a group of or individual decoders, and contains the MSK and the digital signature as well as other in~ormation, such as address and message length. Each STU 90 contains a unique public address that identifies the decoder. Before the EMM is transmitted, this public address information is embedded i~ a clear field of the EMM. The STU 90 ~m~ neS the clear public address field of all incoming EMMs and accepts tho~e that contain its particular public address. In this manner, specific information may be transmitted to individual STUs go.
When the EMM is received by the STU 90, the STU sO
decrypts the EMM with its private key (box 1026). This results in a clear EMM carrying the MSK and a token, which bears the digitally signed hash of the EMM. The token portion of the message (i.e., the digitally signed hash) i5 decrypted with the SP~s public key ~box 1028), which results in a hashed EMM. Concurrently, the clear EMM output from box 1026 is hashed to produce a hashed EMM. If the message is authentic, then the two hash values will be equivalent (box 1032). The MSK that arrived in the EMM can then be authenticated for use by the STU 90. In order to determine the proper SP 110 public key at box 1028 and thereby decrypt the messages received, the STU 90 will keep an internal list of public keys corresponding to the private keys of authorized SPs 110. This information is provided to the STU
90 by the conditional access authority to ensure the integrity of the public key~.
In summary, a stream of program bearing MPEG-2 transport packets enter the SABER 20 embedded in a network protocol layer. The SABER 20 removes the first network protocol layer to access the MPEG-2 transport packets.
Conditional access layers are added through multiple encryption levels. MPEG-2 transport packets bearing ECM~
and EMMs generated by the conditional access process are CA 02237293 1998-0~-ll W O 97/24832 PCTrUS96/13743 multiplexed with the transport packets that carry the data (e.g., video, audio) o~ the user selected program to ~orm a single outgoing packet stream destined for the STU 90.
Before the MPEG-2 transport packets exit the SABER 20, they are encapsulated into the original network protocol in which they were received or a different, second network protocol layer ~or transmission over the digital network 70.
The details o~ the inner-workings o~ the SABER 20 are discussed below in approximately the order o~ packet ~low through the conditional access system. A departure ~rom that order is made in describing the input 28 and output cards 26. Those cards are described together because o~ their ~unctional overlap. Following the input and output card descriptions, details of the various components that implement conditional access are described.
IV. The Service Access and Broadband EncrY~ter Re-mapper (SABER).
The SABER 20 receives input from various other system components. From the file server(s) 60, over data link 40, the SABER 20 receives programs in the form of MPEG-2 transport packets embedded in a network protocol layer.
From the CAM 30 over an ethernet interface 140, the SABER 20 receives program speci~ic encryption information (i.e., which programs, identi~ied by PIDs, should be encrypted) and replacement PID values. When the SABER 20 has ~inished adding conditional access layers to a program, it re-encapsulates the MPEG-2 transport packets o~ the program into a second network protocol and transmits them to the digital network 70 over data link 50.
As illustrated in Figure 2, internally the SABER
20 is comprised of a channel bank backplane 21 ~or inter-card communication, one or two input cards 28, an output - card 26, a conditional access card 24 and a control card 22.
Non-encrypted programs are received ~rom a SP 110 via the 35 input cards 28a and 28b, which remove the MPEG-2 transport packets o~ the programs ~rom the network protocol o~ data link 40 and replace the PIDs assigned by the ~ile server o~

CA 02237293 1998-0~-11 W O 97124832 PCT~US96/13743 the SP 110 with new PIDs. The9e PIDs are replaced by the SABER 20, as provided by the CAM 30, to prevent multiple programs from multiple SPs 110 from delivering program information in MPEG-2 transport packets with identical PIDs.
The MPEG-2 transport packets are then sent over the backplane 21 to the control card 22, which multiplexes multiple MPEG-2 transport streams together when more than one input card 28 is used. The control card 22 then transfers the transport packets to the conditional access card 24 over data path 150. The conditional access card 24 encrypts the transport packets as required and sends them back to the control card 22 via data path 150. The transport packet~ are then multiplexed and sent over the backplane 21 to the output card 26, where they are embedded into a second network protocol for transmission over data link 50.
. Channel Bank Backplane The Channel Bank Backplane 21 is an inter-card communication interface. The bus ensures that the cards of the SABER 20 can transmit control information and transport packets among themselves. All the cards desired for a particular set-up are configured and then plugged into the backplane 21. For example, if a SABER 20 is desired that accepts MPEG-2 transport packets in an FDDI network protocol and that outputs MPEG-2 transport packets in an SONET-ATM
network protocol, then FDDI capable input cards 28 and a SONET-ATM capable output card 26 are plugged into the backplane 21 in the appropriate slots and the desired protocol conversion is accommodated.
The backplane 21 is an 8 blt-parallel data bus with clock, enable and sync lines. The bus operates at a clock rate of 27 MHz, which is the nominal clock rate defined by the MPEG-2 standard. Each card, with the exception of control card 22, interfaces to the backplane 21 through a common channel bank interface tCBI). The CBI
provides a FIFO buffer and glue logic for inter-card communication. The CBI operates in conjunction with the CA 02237293 1998-0~-11 W 097/24832 PCT~US~6/13743 channel bank multiplexer (CBMUX) 152 on the control card 22, to transfer MPEG-2 transport packets across the backplane 21. Cards that need to transfer data over the backplane 21, such as the input cards 28, have a local buffer within the CBI to store MPEG-2 transport packets until packets ~ transfers are requested by the CBMUX 152. When polled by the CBMU~ 152, the CBI transfers a packet over the backplane 21 where it is retrieved by the CBMUX 152 on the control card 22. Control in~ormation is transferred between cards over the backplane 21. Although the presently pre~erred bus is a high speed 8-bit parallel bus, those skilled in the art should appreciate that alternate bus designs could function equally well, for example, a 32-bit parallel bus could be used.
The CBMUX 152 also directs the CBI on a particular card to accept packets from the backplane 21. For example, in order for the CBMUX 152 to transfer a packet to the output card 26, the CBMUX 152 signals the CBI on the output card 26 to receive the packet. The packet is then output over the backplane 21 where it is received and bufferred by the CBI on the output card 26.
B . InPut/Out~ut Cards According to another aspect of the present invention, the SABER 20 has a capability to conform to different protocols merely by selectively plugging cards into the backplane 21 that implement the desired protocol.
Such capability facilitates the ability of SABER 20 to translate between a variety of network protocols. To facilitate this multiple translation feature, the appropriate input 28 and output cards 26 are selected, configured, and plugged into the proper slots in the SABER
20. The input card 28 that matches the input network protocol of data link 40 is plugged into the backplane 21.
The output card 26 that matches the output network protocol of data link 50 is also plugged into the backplane 21. As a result, the S~3ER 20 can translate between the two network protocols selected from the group of network protocols CA 02237293 1998-0~-11 W O 97124832 PCTrUS96113743 supported by the input 28 and output cards 26, while providing conditional access.
The cards 26, 28 that interface to the network data links 40, 50 are generally implemented as a single card that operates in either an input mode or an output mode.
For example, if SONET-ATM is selected as the input network level protocol for data link 40, a SONET-A~M I/O card would be configured as an input card 28. The card 28 will then accept data in the form of SONET frames carrying ATM cells that contain MPEG-2 transport packets. The card 28 will extract the MPEG-2 transport packets from each incoming data stream. On the other hand, if SONET-ATM is selected as the output network protocol for data link 50, an identical card could be configured to map MPEG-2 transport packets to, and output packets in, ATM-cell bearing SONET frames.
Functional descriptions of the input 28 and output cards 26 are described below. Following the functional descriptions, the various mappings from network layer protocols to MPEG-2 transport packets are described.
Finally, details are provided that describe two exemplary input/output card implementations.
1. Input Card Functions An input card 28 may con~orm to one of a variety of network protocols. For example, the input card 28 may receive programs in an FDDI, SONET-ATM, UNISON-1, or DS-3 protocol. ~owever, these protocols are merely examples and should not be construed as limiting. An input card 28 accepts program data from data link 40 in the form of MPEG-2 transport packets which are embedded in the network protocol layer of data link 40 and then extracts the MPEG-2 transport packets from the network protocol layer. Examples of the mapping between MPEG 2 and the various protocols are described more fully below.
In addition to removing the network protocol from the received data, the input cards 28 re-map the PIDs carried in the set of MPEG-2 transport packets of each program. As noted above, programs are stored on the file CA 02237293 1998-0~-ll W 097/24832 PCT~US96/13743 servers 60 in MPEG-2 transport packets. When a program is output from a file server 60, the file serVer 60 assigns Packet Ids (PI~s) to the transport packets of the program that are uni~ue with respect to that file server 60.
However, multiple file servers 60 feed programs to the SABER
- 20, and potentially, multiple SABERs 20 feed programs to the digital network 70. If two or more file servers 60 output programs in MPEG-2 transport packets bearing identical PIDs, collisions will occur. Accordingly, the CAM 30 (see Figure 1), in conjunction with information provided by the NCMC
100, keeps track of the PIDs in use over the network and provides the SABER 20 with a PID re-mapping table that gets stored on the input card 28. After the input card 28 has removed the network protocol layer, the PIDs assigned by the file servers 60 are extracted from the MPEG-2 transport packets. The input card 28 then searches the PID re-mapping table for available PIDs and replaces the PIDs received from the file server 60 with those specified in the table, before transferring those packets to the control card 22. In this manner, the NCMC 100 and CAM 30 ensure that no PID
collisions occur downstream in the system 10.
2. Out~ut Card Functions ~ s with the input cards 28, the output card 26 conforms to one o~ a variety of network protocols.
Moreover, with the exception of PID re-mapping, the output card 26 performs the functional opposite of the input card 28. Essentially, the output card 26 receives MPEG-2 transport packets ~rom the backplane 21 through its CBI and maps the MPEG-2 transport packets into the network protocol of data link 50. Then, the output card 26 outputs the particular program over the data link 50. The example mappings presented below describe, in detail, how the MPEG-2 - transport packets are mapped to or from a given network protocol. In the input mode, the MPEG-2 transport packets ~ 35 are removed (i.e., mapped out) from the network protocol.
In the output mode, the MPEG-2 transport packets are mapped into the network protocol.

CA 02237293 1998-0~-ll W 097/24832 PCT~US96/13743 3. MPEG-2 ~--> Network Layer Protocol Map~inqs Understanding the format of an MPEG-2 transport packet is a prerequisite to understanding how these packets are mapped among the various network protocols.
Accordingly, Figure 4 illustrates a standard MPEG-2 transport packet 200. As depicted, the MPEG-2 transport packet is a fixed length packet of 188 bytes. Further, those 188 bytes are divided among a 4 byte header 210, a variable length adaptation field 220 of n bytes, and a 184-n byte payload 230. The adaptation field 220 is optional and may contain such things as timestamps for synchronizing the components of distribution system 10. As a general rule and as is described more specifically according to each network protocol below, to efficiently map the MPBG-2 transport packets of a given program to the desired network layer protocol, the MPEG-2 packets are sometimes concatenated to form larger data blocks and sometimes segmented to form shorter data blocks. Exemplary protocol mappings are provided below.
a. MPEG-2 c--~ SONET-ATM mapPinq According to a presently preferred embodiment, an available selection of input/output cards 26, 28 support a mapping between MPEG-2 transport packets and SONET-ATM.
This mapping consists of several layers of translation.
First, MPEG-2 transport packets are mapped into ATM cells via AAL5 PDUs, then the ATM cells are mapped into SONET
frames. This mapping is illustrated in Figure 5.
As shown in Figure 5, the mapping between MPEG-2 and ATM iB facilitated by the use of ATM adaptation layer 5 protocol data units (AAL5 PDU). The AAL 5 PDU has a variable length payload field that generally must be padded to align to a 48-byte boundary. The 8-byte trailer contains standard AAL 5 PDU information, such as length and CRC-32 information. Two MPEG-2 transport packets 200a and 200b map into the payload 252 of a single AAL5 PDU 250 at the common part convergence sublayer. Because the two 188-byte MPEG-2 packets and the 8-byte trailer are aligned to a 48-byte CA 02237293 1998-0~-ll WO 97/24832 PCT~US96/13743 boundary (i.e., equally divisible into 48-byte blocks), no padding is required. Thereafter, the mapping proceeds according to standard ATM specifications. Conveniently, the payload 252 and the trailer 254 of the AAL5 PDU 250 together total 384 bytes, which segments into exactly eight ~ segmentation and reassembly PDUs 260. These eight 48-byte SAR PDUs 260 fit into the payload 272 of eight ATM cells 270. The ATM cell header 271h of the eighth cell 270h has its user-to-user indicator bit set to 1, which indicates that it is the last cell of the group of eight that comprise the two MPEG-2 transport packets 200a and 200b.
When mapping from ATM cells into MPEG-2 packets, ATM cells are grouped by the number of cells between cells with user-to-user interface bits set to one. The payload of each of the eight cells is removed and concatenated. The CRC-32 value can then be checked at the common part convergence sublayer to veri~y the data. If the data is valid the AAL 5 payload can be divided into the two MPEG-2 transport packets.
SONET OC-3 provides the physical layer for transmitting the MPEG-2 bearing ATM cells. Accordingly, the ATM cells must be further mapped into SONET frames for transmission over the physical data lin~s 40, 50. The SONET
to ATM mapping follows the well-known UNI 3.1 standard, which is described in detail in the ATM User-Network Inter~ace Speclfication, Version 3.1, which is hereby incorporated by reference. SONET OC-3 provides a physical connection at 155.52 Mbps. Generally, the mapping of ATM
cells is per~ormed in a row alignment ~ashion, with the byte structure of the ATM cell aligned with the byte structure of the SONET payload. The ATM cells fill the entire SO~ET
~rame payload. Although the SONET connection per~orms at - 155.52 Mbps, because of the SONET overhead, the actual transfer capacity for ATM cells is 149.76 Mbps.

CA 02237293 1998-0~-11 WO 97/24832 P~T~US96/13743 b. MP~G-2 to FDDI Ma~inq A standard FDDI frame is illustrated in Figure 6.
Standard FDDI frames 280 are a maximum of 4,500 octets, comprised of a preamble 281, starting delimiter 282, frame h~A~e~ 283, information (herein conforming to Logical Link Control PDU format) 284, frame check sequence 285, ending delimiter 286 and frame status fields 287. All of these fields are standard FDDI protocol and are not modified with respect to the mapping of MPEG-2 transport packets. For example, the frame header field 283 contains standard destination 294 and source address fields 296. The frame control field 292 within the frame header 283 contains an indicator that the frames are asynchronous non-source routed Logical Link Control frames. Thus, the information field 284 within the FDDI frame 280 contains data in Logical Link Control PDUs that conform to standard IEEE 802.2 Type I
packets. The payload 299 contains the MPEG-2 transport packets 200a-200u concatenated end to end, with a single payload carrying a maximum of 21 MPEG-2 transport packets for a total of 3948 octets.
c. MPEG-2 to DS-3 Ma~pinq Figure 7 illustrates the MPEG-2 transport packet to DS-3 frame mapping. ~ccording to the mapping, three MPEG-2 transport packets 200a, 200b, and 200c (not shown) map into a single DS-3 frame. For DS-3 mapping, each 188 byte MPEG-2 transport packet i8 concatenated with an additional 8 byte trailer 205 giving a final packet length of 196 ~ytes. The trailer contains t=4 Reed-Solomon forward error correction ~ytes. A single DS-3 frame may contain up to 4,704 bits or 588 bytes of data. Since the MPEG-2 transport packets with the Reed-Solomon encoding are 196 bytes, three MPEG-2 transport packets map into the data bits of a DS-3 ~rame. The three concatenated MPEG-2 transport packets are then loaded into the DS-3 frame data bits with the most significant bit of the first transport packet aligned with the most significant bit of the DS-3 ~rame. No su~frame alignment is necessary.

CA 02237293 1998-0~-11 W 097/24832 PCT~US96/13743 d. UNI5QN
The data links 40 or 50 may also transport digital data in accordance with a UNI-directional, Synchronous Optical Network (UNISON-l) interface developed by the assignee o~ the present invention. The UNISON-1 interface ~ has physical layer characteristics as well as an underlying network transport structure modeled after the Synchronous optical Network (SONET) transport protocol. A UNISON-1 network provides point to point optical communications using a modification of SONET which does not require complete conformance to the SONET specifications. The physical interface for the UNISON-1 optical signal preferably meets the specifications described for the OC-3 optical inter~ace, intermediate reach, as defined in Bellcore document TR-NWT-000253, Issue 2, December l991, Section 4, Table 4.11,Column IR-1, while the physical/optical connector is preferably an F~/PC mechanical connector. The UNISON-1 interface signal is preferably synchronized from a Stratum 3 timing source derived from a Regional Bell Operating Company.
Preferably, the basic data rate utilized in the digital network 70 in accordance with the invention is the Synchronous Transport Signal Level 3 concatenation (STS-3c) rate of 155.52 Mbps. Concatenation refers to the transport condition of a SONET system where the entire Synchronous Payload Envelope (SPE) is treated as a single entity or contiguous data stream. In a preferred embodiment, MPEG-2 transport packets are mapped into the SPE and are then passed to the digital network 70 as a single entity. The optical counterpart of the STS-3c is the Optical Carrier Level 3 signal (OC-3), which is the result of a direct optical conversion of the STS-3c after frame synchronous - scrambling.
As shown in FIGURE 8, a preferred embodiment of ~ 35 the STS-3c frame ~or UNISON-l in accordance with the invention consists of 270 columns and 9 rows of 8-bit octets, for a total of 2430 octets. With a frame length of CA 02237293 1998-0~-11 W O 97/2483~ PCTrUS96/13743 125 microseconds (8000 frames per second), the STS-3c has a bit rate of 155.52 Mbps. In a preferred embodiment, the first three columns in each row are the Transport Overhead containing overhead octets of Section and Line layers. As shown in FIGURE 9, 81 octets are thus allocated, with 27 octets allocated for Section Overhead and 54 octets allocated for Line Overhead. The Section Overhead for STS-3c preferably consists of the following fields: STS-3c framing (A1 and A2), multiplex identification (C1), bit-interleaved parity (BIP-8) (Bl) for Section error monitoring functions, and three octets allocated to form one 192 kbps message ~ased channel (D1, D2 and D3). E1 and F1 are currently unused. The Line Overhead for the STS-3c, on the other hand, preferably consists of a pointer field (H1 and H2) which provides offset in the octets ~etween the pointer and the first octet of the STS SPE and indicate~ when concatenation has occurred, a bit-interleaved parity field (B2) for line error monitoring functions, and nine octets allocated to form one 576 kbps message ~h~nnel (D4 through D12). H3, K1, K2, Z1, Z2, and E2 are currently unused.
The payload is contained in the SPE as illustrated in FIGURE 10, which is a 125 msec frame structure. The illustrated UNISON-1 STS-3c SPE consists of 261 columns and 9 rows of bytes, for a total 2349 bytes. As shown in FIGURE
10, column 1 preferably contains 9 bytes designated as STS
Path Overhead (POH), while the rem~;n;ng 2340 bytes are available for payload. The UNISON-1 STS-3c SPE begins in row 1, column 10 of the STS-3c frame. In a preferred embodiment, MPEG- 2 transport packets are mapped into the UNISON-1 STS-3c SPE as illustrated in FIGURE 10. As shown in FIGURE 10, the Path Overhead consists of the following fields: B3 is a Bit-Interleaved Parity octet (BIP-8) for path error monitoring functions; C2 is allocated to indicate the construction and content of the STS SPE; H4 indicates the location of the start of the next MPEG-2 Systems transport packet envelope; and the remainder of the POH
octets are currently unused. The MPEG-2 transport packets CA 02237293 1998-0~-11 W 097/24832 PCT~US96/13743 are then mapped into the UNISON-l STS-3c payload, as shown in FIGURE 10, where the SPE payload consists of reserved (R) octets (currently unused), MPEG-2 transport packets ~ comprising 188 octet packets combining a variety of video, audio and private data into single or multiple streams for ~ storage or transmission, and a Reed Solomon Parity bit (P) ~or error correction. The Reed Solomon Parity bit is preferably calculated over the preceding MPEG-2 Systems transport packet (188 octets), where the Reed Solomon code used for the parity calculation is a code which is implemented using a 8ymbol size (M) of~ 8 bits and the polynomial p(x) = X8 + x7 + X2 + x + 1 to generate a Galois Field o~ 256.
In order to keep emulation o~ frame bytes from occurring in the SPE, scrambling is employed. Pre~erably, a frame synchronous scrambler of sequence length 127 operating at the line rate is used. In a preferred embodiment, the generating polyr}omial i8 1 + X6 + x7. All bits to be scrambled are added, modulo 2, to the output ~rom the X7 position of the scra~bler. Pre~erably, the scrambler runs continuously throughout the complete STS-3c frame illustrated in FIGURE 8. However, the ~rame bytes and the identi~ication bytes pre~erably are not scrambled.
Finally, concatenation re~ers to the transport condition of a SONET OC-N system where the entire SPE is treated as a single entity or contiguous data stream. When concatenation is implemented, the H1 and H2 octets are assigned predefined values. Preferably, the MPEG-2 Systems transport packets are mapped into the SPE and are then passed to the digital network 70 as a single contiguous entity.
4. Detailed I/O Card ImPlementation Exam~les - In a presently pre~erred embodiment o~ the conditional access system, the SABER 20 accepts programs over data link 40 in FDDI ~rames, and outputs the program with the conditional access over data link 50 in SONET-ATM
frames. To m~;mi ze the data trans~er rates in such a CA 02237293 1998-0~-11 W O 97/24832 PCT~US96/13743 configuration, two FDDI input cards 28a, 28b are matched to a single SONET-ATM output card 26. Presented below are the implementation details for an exemplary input card 26 that implements FDDI to MPEG-2 mapping and an exemplary output card 28 that implements MPEG-2 to SONET-ATM mapping.
a. FDDI to MPEG-2 implementation details Referring to Figure 2A, the FDDI card is capable of accepting data over an FDDI network from a m~; mllm of 64 programs at a combined rate of 75 Mbps. Multiple FDDI cards can be inserted into the backplane 21 to achieve the combined data rate and number of sessions desired.
The FDDI frames arrive over an optical fiber inter~ace from data link 40. The standard FDDI rate of 100 Mbps is supported, although the MPEG-2 transport packets transferred to the ~DDI card arrive at a combined rate of 75 Mbps. The additional bandwidth is available for overhead frame information and communication from the FDDI card 28 to the file server 60. The FDDI ~rames are bufferred by the FDDI Interface and DMA control section 121, which strips away the physical layer of FDDI information and transfers the FDDI payload of MPEG-2 packets to the RAM buffer 123.
The Session Manager and Data Pre-processor 122 replaces all of the PIDs on a per-frame basis. Additionally, the processor 122 handles communication with the FDDI Inter~ace and DMA control section 121 to communicate with the file server 60 to maintain the FDDI link. For example, buffer overflow or underflow conditions are monitored and communicated to the file server 60 to slow down or speed up the transfers of data as needed. Buffer levels are constantly monitored. Also, a frame sequence count is monitored to ensure synchronization between the FDDI card and the file server 60. After PIDs are re-mapped, the transport packets are transferred to bu~er 124.
A Session Buffer Management and Rate Control tSBRC) section 125 keeps track of the MPE~-2 transport packets on a per session basis. The SBRC section 125 calculates the rate at which packets should be output for -CA 02237293 1998-0~-11 W 097/24832 PCTrUS96/13743 each session. When a packet is due for output, it is moved to the CBI 126 for output onto the backplane 21 ~or delivery to the control card 22 and thereafter the conditional access ~ card 24. In addition, the SBRC section 125 corrects the timebase of the program for variable delays experienced on the FDDI input card 28. The timebase correction i8 outlined in the MPEG-2 Systems Standards Reference.
b. MPEG-2 to SONET-ATM im~lementation details An exemplary output card 26 that implements the SONET-ATM mapping is illustrated in Figure 2B. The function of the card can be appreciated in conjunction with Figure 5, which illustrates the mapping of MPEG-2 transport packets into ATM cells. The control processor 264 is a general purpose processor that controls the flow of in~ormation through the input card 26. The channel bank inter~ace 262 receives MPEG-2 transport packets from the control card 22 via backplane 21. The MPEG-2 transport packets are stored in bu~er 263, awaiting processing by the MPEG processor 265. The MPEG processor 265 manages the buffer 263, and passes pairs of MPEG-2 transport packets, which form an A~L
5 PDU, to the ATM segmenter and reassembler (SAR) 267.
Segmentation consists of dividing the AAL 5 PDU into 48-byte blocks and adding a 5-byte header. The SAR 267 then buf~ers the ATM cells internally and ~eeds the cells as needed to the ATM framer 268.
Adaptation of the cell stream output from the SAR
267 is performed by the ATM framer 268, which envelops the ATM cells into SONET frames for output. The ATM framer 268 contains an elastic buffer for cell storage, calculates the ATM HEC byte, and stu~fs null cells into the SONET frame when the SAR has no cells ready for transmission. The ATM
framer 268 creates the OC-3c frame, and generates and - inserts into the OC-3c data stream B1, B2, and B3 parity bytes. The SONET ~rames are then sent to the SONET OC-3c - 35 transceiver 269 for transmission over ~igital networ~ 70.
The transceiver includes an optical transmitter suited for transmitting an OC-3 signal of the intermediate reach class.

CA 02237293 1998-0~-11 W O 97/24832 PCTrUS96tl3743 The transmitter i8 driven by a 155.52 Mbps balanced PECL
driver.
D. Control Card Figure 2D is a functional block diagram of the operation o~ the control card 22. The control card 22 accepts transport packets from the backplane 21 through the CBMUX 152. The CBMUX 152 polls the input cards 28 via the backplane 21 for available packets. When multiple input cards 28 are plugged into the SABER 20, the CBMUX 152 ~ultiplexes the MPEG-2 transport packets into a single stream by polling each input card 28 succeqsively. After a packet is retrieved from an input card 28 by the data poller 135, the packet is transferred to buffer 137, where it waits to be transferred to the conditional access card 24. MPEG-2 transport packets are then transferred via interface 150 to the conditional access card 24, where the packets are selectively encrypted as described in detail below. After the conditional access card 24 has completed its functions, the MPEG-2 transport packets are transferred back to the control card 22 via interface 150 and accepted by the data output block 139. When the SABER 20 is configured with two input cards 28a and 28b, the control card 22 multiplexes MPEG-2 transport packets from the respective cards together before delivering them to the conditional access card 24.
The control card 22 receives provisioning information from the CAM 30 over the ethernet data link 140. The ethernet interface 136 moves the provisioned in~ormation into memory for access by the control processor 132.
The control card 22 multiplexes the MPEG-2 transport packets of one or more programs, including transport packets containing EMMs generated by the CAM 30 and ECMs generated by the conditional access card 24 in accordance with the MPEG-2 Systems Standards Reference (ISO
13818-1). When instructed by the control processor 132, the ~BMUX 152 outputs an MPEG-2 transport packet from the data output buffer 139 to the output card 26. The output card 26 CA 02237293 1998-0~-11 W O 97t24832 PCTrUS96/13743 then appropriately ~ormats the data for output from the SABER 20.
. ~onditional Access Card Conditional access is provided through the cooperation of three separate components: the conditional access manager (CAM) 30, the control card 22 and the conditional access card 24. These three components implement the improved three layer encryption scheme of the present invention for providing conditional access to the MPEG-2 transport packets of particular programs, which has been described in detail above. Data flow between the components i~ illustrated by reference to Figures 2 and 2C.
Non-encrypted MPEG-2 transport packets that have been removed from the network protocol in which they were received from data link 40 are transferred from the input card 28 to the control card 22 via the backplane 21. The packets are then transferred from the control card 22 to the conditional access card 24 via link 150 for encryption.
Periodically, the CAM 30 provides the conditional access card 24 with an MSK used to encrypt the control words of the first level of encryption. After the conditional access card 24 encrypts the MPEG-2 transport packets using the frequently changing control words, it transfers the packets back to the control card 22 via data link 150. The control card 22 multiplexes these transport packets, along with other transport packets, to form an outgoing transport stream for transmission to an STU 90.
The encryption model of the present invention is illustrated in Figure 3. That model was described in detail above. According to a preferred embodiment of the present invention, the conditional access card 24 implements the first two of the three encryption layers and the last layer ~ is provided by the CAM 30. At the first layer, the non-encrypted transport packets enter the program encrypter 154 through data path 150. A control word (i.e., key) is provided by a random number generator 156 located on the conditional access card 24. In particular, the random CA 02237293 1998-0~-ll W O 97/24832 PCT~US96/13743 number generator 156 provides a seed to the controller 157 which generates control words used to encrypt the transport packets. The random number generator 156 is implemented using a dedicated hardware device such as the NM 810 random number generator card from Newbridge Microsystems.
According to the presently preferred embodiment, the program encrypter 154 uses the well-know Data Encryption Standard (DES) algorithm to encrypt the programs. To increase the robustness of the encryption algorithm against attack, the control words are changed often (e.g., every few seconds).
Moreover, because the entire program must be encrypted in real-time, the encryption algorithm is implemented in hardware.
The control words are encrypted using the MSK
received ~rom the CAM 30. The data rates of the control words relative to the program information are relatively low. Therefore, more exhaustive encryption can be done to ensure the security o~ the control word encryption against attack. These control words are encrypted using Triple-DES.
Because more time is available to encrypt the control words, the encryption algorithm is implemented in firmware.
Figure 2C illustrates a block diagram of the internal operation of the conditional access card 24 The MPEG-2 transport packet~ arrive from the control card 22 over data link 150 and are bufferred in FIFO 160. The packets then travel to the packet distribution logic 163.
The packet encryption processor 158 per~orms the control word look up on a per-packet basis and is implemented using an AM29030 RISC processor. Specifically, processor 158 retrieves a control word that corresponds to the PID of the packet to be encrypted. The control word is transferred to the packet distribution logic 163, which distributes packets and control words to the DES blocks 166.
Each DES block 166 receives an entire packet, determines if the packet is to be encrypted and, if so, breaks the packet into 8 byte blocks and sends the blocks to a VM009 VLSI DES chip for encryption of the MPEG-2 payload CA 02237293 1998-0~-11 W O 97/24832 PCT~US96/13743 230 (see Figure 4). After encryption, the three packets are re-multiplexed by the packet re-multiplexing logic 162, which ensures that the packets are output in the same order that they arrived. From the packet re-multiplexing logic 162, the FIF0 161 buffers packets for transmission back to ~ the control card 22 for output onto the backplane 21.
A control processor 157, in cooperation with the random number generator 156, generates control words, assigns the control words to the PIDs o~ packets to be encrypted, and places them into the dual port RAM 151 for use by the packet encryption processor 158. The CAM 30 provides the control processor 157 over the ethernet interface 159 with information, such as the identity o~ PIDs that should be encrypted and updated MSKs. The control processor communicates this information to the packet encryption processor 158 via dual port RAM 151 80 that the processor 158 can selectively control the encryption of program bearing transport packets. In addition, the control processor 157 in conjunction with the Triple-DES encrypter 153 encrypts the control words with the current MSK. The Triple-DES encrypter 153 comprises a VLSI VM007 encrypter chip that implements the Triple-DES encryption algorithm.
The message authentication function (i.e., MD5 hashing) described in detail above is implemented by the Control Processor 157.
The encrypted control words are sent to the CBI
164 where they are inserted in MPEG-2 transport packets, assigned a uni~ue PID, and transmitted over the backplane to be multiplexed into the stream of transport packets by the control card 22. The MSK is also encrypted and inserted in MPEG-2 transport packets. These transport packets are generated by the CAM 30 but are also routed through the CBI
164 of the conditional access card 24 for output onto the backplane 21. All the transport packets are multiplexed by the control card 22 to form a single outgoing transport stream.

CA 02237293 1998-0~-11 W 097/24832 PCTA~S96/13743 V. Conditional Access Manager The CAM 30 acts as the master controller of the conditional access system. It provides the connections to a variety of external components to determine all the information necessary to ~et-up an environment for applying conditional access. A functional block diagram of the CAM
30 in the context of the various external components is provided in Figure 12. ~s illustrated, the CAM 30 communicates with the server gateways 61 to coordinate PID
assignments and to receive information concerning program conditional access re~uirements. Additionally, the CAM 30 communicates with the SABER 20 to provide provisioning information, such as PID re-mapping tables, and to communicate conditional access information to the STUs 90.
The CAM 30 communicates with a conditional access authority 40~ (i.e., a public key server) to get the public keys of the STUs 90 and the SPs 110.
The third level of encryption, as explained in detail above, iB performed by the CAM 30. This third level is implemented using a public-key encryption algorithm. In the present embodiment all interfaces from the CAM 30 and the external components are through ethernet. However, this i8 merely an example and i8 not intended to be limiting.
Any suitable interface to external components can be employed that achieves similar results. For example, a dial-up connection can provide the required link between the CAM 30 and the conditional access authority 400. A small computer systems interface can provide the connection to more proximate devices, such as the transaction encryption device 300.
The CAM 30 consists of a control processor 32 and memory 34 for program-related storage. Most of the functions of the CAM 30 are implemented in software.
Initially, the CAM 30 is in communication with the server gateways 61, via an ethernet connection. When a server gateway 61 has received a request for a program from a customer and has received authorization for connection , CA 02237293 l998-0~-ll W O 97/24832 PCT~US96/13743 bandwidth ~rom the NCMC lOo, the SP 110 prepares to transmit program bearing MPEG-2 transport packets to the requesting STU 9Q over the distribution system 10. In so preparing, the server gateway 61 communicates with the CAM 30 and relates information, such a9 which PIDs are assigned to the program and whether conditional access should be applied.
After receiving the request, the CAM 30 informs the SABER 20 of the PID re-mapping and conditional access requirements of the program. The ~AM 30 also provides the SABER 20 with the current MSK to be used in providing conditional access to a program. In addition to sending the MSK to the S~3ER 20, the CAM 30 must send the MSK to authorized STUs 90. The CAM
30 also per~orms the digital signature ~unction described above.
To perform the encryption services, the CAM 30 includes a transaction encryption device (TED) 300 that has secured within it the private key of the SP. The CAM 30 then provides the TED 300 with the MSK. The TED 300 encrypts the MSK with the appropriate STU 90 public key and signs the hash of the MSK message with its SP private key, according to the process described in detail above and illustrated in Figure 3B. The MSK and signed hash are then returned to the CAM 30 where it is embedded in a EMM for transmission to the STU 90 via the SABER 20.
In addition to ~haring STUs 90, multiple SPs 110 may share a single conditional access apparatus (i.e., SABER
20 and CAM 30). Applicants have recognized that security risks are presented by such sharing. For example and as described above, as part of the conditional access system, SPs 110 must sign the message hash with a digital signature to prevent unauthorized access to the STUs 90. This is accomplished by encrypting the hash with the private key of - the SP 110, which corresponds to its public key that has been provided to the STUs 90.
According to a preferred embodiment of the present invention, in such a shared configuration, the CAM 30 acts as a clearinghouse for all SPs 110. The CAM 30 authorizes CA 02237293 1998-0~-11 W O 97/24832 PCTrUS96/13743 the SPs 110 via the server gateway 61 and then the CAM 30 digitally signs all messages on behal~ of the SPs 110.
Accordingly, the message from the SP 110 to the CAM 30 will be hashed and signed according to a digital signature technique, similar to that illustrated in Figure 3B. The CAM 30 will check the SP 110 signature against a corresponding public key, which the CAM 30 receives from the conditional access authority 400. If the digital signature is authentic, the connection to the STU 90 will be allowed.
In transmitting MSKs to the STU 90 via an EMM, the EMM is hashed and signed with the digital signature of the CAM 30.
The STU 90 will recognize this digital signature as authentic according to the method described above for the SP
110 to STU 90 digital signature. This system will allow multiple SPs 110 to share a single CAM 30 and SABER 20 by sharing a single private key. However, in such a system, the STUs 90 are unable to distinguish between SPs 110. In an environment where it is desirable for the STUs 90 to distinguish among SPs 110 a di~ferent system is necessary.
According to another aspect of the present invention, multiple SPs llo can share a single CAM 30 and SABER 20 combination by each employing a separate TED 300.
In such an environment, the CAM 30 communicates with the TED
300 o~ each SP 110 to encrypt and sign MSKs for delivery to the STUs 90. The SPs 110 can then each provide a separate public/key private key pair. In such a system, measures are taken to ensure that the private key of each SP 110 is adequately protected from discovery. Then each request by a SP 110 via a corresponding server gateway 61 would result in all encryption for that SP 110 being directed to its own TED
300. Thus, multiple SPs 110 can share a single CAM 30 and SABER 20 and the STUs 90 will still be able to distinguish between SPs 110.
Each STU 90 has a public key/private key pair.
The private ~ey is secured within the STU 90 in a secure processor. The associated public key is then published in a public key database server maintained by a conditional CA 02237293 1998-0~-11 W O 97/24832 PCTrUS96/13743 access authority 400. When an SP llo wishes to provide conditional access to its programming for a particular STU
90, the CAM 30 looks up the public key for the STU 90 and sends the MSK to the STU 90 encrypted with the public key o~
that STU 90. The STU 90 can then decrypt the MSK using its corresponding private key. The CAM 30 maintains a data base o~ valid STU 90 public keys, which it periodically updates ~rom the conditional access authority 400.
VI. An exemplarY Set To~ Unit (STU) Figure 11 i9 a functional block diagram o~ an exemplary STU 90. After a NAN 80 removes the MPEG-2 packets from the network protocol of the digital network 70, raw MPEG-2 transport packets are transmitted to the STU 90. The STU 90 receives the packets through its bro~h~n~ inter~ace processor 190, which negotiates the delivery o~ packets ~rom the NAN 80. The broadband interface processor 190 receives instructions ~rom the general purpose processor 193 about which packets to de-multiplex from the MPEG-2 transport packet stream. These instructions include information related to the ECMs associated with the program bearing MPEG-2 transport packets. The broadband interface processor 190 passes the associated ECMs to the secure processor 196 which per~orms the Triple-DES decryption of the control words carried in the ECMS and verifies that the STU 90 is authorized for the requested program service. The secure processor 196 then passes the decrypted control words back to the broadband interface processor 190 which uses them to decrypt the program.
The secure processor 196 also per~orms the decryption o~ the MSKs carried in EMMs. The secure processor contains the private key that corresponds to the public key o~ the STU 90, which the SP 110 used to encrypt - the EMMs as described in detail above. Additionally, the secure processor 192 has access to the public keys of authorized SPs 110 which are contained in bu~fer 192. Thus, the secure processor 192 implements the reverse o~ the third level of encryption described in detail above and provides CA 02237293 l998-0~-ll W 097/24832 PCTnUS96/13743 EMM authentication by verifying the digital signature of the EMM.
After the program bearing MPEG-2 transport pac~ets are decrypted by the broadband interface processor 190, the packets are output to FIF0 191. The memory manager 194 then moves the packets to buffer 192 for access by the MPEG-2 multimedia processor 198. The transport packets are processed by the MPEG-2 multimedia processor 198 for playback on a pre5entation device (not shown). The presentation device may be any appropriate device, such as a television or a personal computer.
As the foregoing illustrates, the present invention is directed to a method and apparatus for adding conditional access in connection-oriented, interactive networks with a multiplicity of service providers. It is understood, however, that changes may be made to the embodiments described above without departing from the broad inventive concepts thereof. For example, while the present invention is described in the context o~ an interactive system, the same methods and apparatus would work effectively in a broadcast environment.
Accordingly, this invention is not limited to the particular embodiments disclosed, but is intended to cover all modifications that are within the scope and spirit o~ the invention as defined by the appended claims.

Claims (52)

WHAT IS CLAIMED:
1. In an interactive information services system for providing at least one of video, audio, and data (program) requested by a customer from a service provider (SP) and for transmitting the requested program in program bearing packets to a set top unit (STU) associated with the customer, apparatus positioned between the SP and the STU
for ensuring that only the customer has access to said program, said apparatus comprising:
means for receiving program bearing packets in a first network protocol from a first data link and removing said packets from said first network protocol;
means for adding conditional access to said program bearing packets; and, means for re-encapsulating said program bearing packets in a second network protocol and outputting said program bearing packets over a second data link.
2. An apparatus as recited in claim 1, wherein said second network protocol comprises one of said first network protocol and an other network protocol.
3. An apparatus as recited in claim 1, wherein said means for receiving program bearing packets comprises:
a receiver for receiving program bearing packets from said first data link;
a buffer for storing the received program bearing packets in said first network protocol; and, a processor for removing said program bearing packets from said network protocol in accordance with a protocol mapping function.
4. An apparatus as recited in claim 1, wherein said means for re-encapsulating said program comprises:
a processor for mapping said program bearing packets to said network protocol in accordance with a protocol mapping function;
a buffer for storing a portion of said program bearing packets in said second network protocol; and, a transmitter for outputting said program bearing packets over said second data link.
5. An apparatus as recited in claim 1, wherein said means for applying conditional access comprises:
means for selecting program bearing packets comprising a program requested by the customer;
means for encrypting said selected program bearing packets according to a first encryption algorithm using a first key;
means for encrypting said first key according to a second encryption algorithm using a second key;
means for providing the encrypted said first key to the customer;
means for encrypting said second key according to a public-key encryption algorithm using a public key corresponding to a private key stored within the STU
associated with the customer; and, means for providing the encrypted said second key to the customer.
6. An apparatus as recited in claim 5 further comprising a means for acquiring said public-key from a public-key database maintained by a conditional access authority.
7. An apparatus as recited in claim 5, wherein said means for encrypting said selected program bearing packets comprises at least one processor implementing a DES
encryption algorithm.
8. An apparatus as recited in claim 5, wherein said means for encrypting said first key comprises at least one processor implementing a Triple-DES encryption algorithm.
9. An apparatus as recited in claim 5, wherein said means for encrypting said second key comprises a processor implementing an RSA algorithm.
10. An apparatus as recited in claim 5, wherein said means for applying conditional access further comprises means for hashing said first key concatenated with said second key according to a hashing function such that the STU
can determine the authenticity of said first key.
11. An apparatus as recited in claim 5, wherein said means for hashing comprises a processor implementing a Message Digest 5 hashing function.
12. An apparatus as recited in claim 5, wherein said means for applying conditional access further comprises means for providing a digital signature based on said second key concatenated with a private key corresponding to a public key associated with said SP such that the STU can verify the source of said second key.
13. An apparatus as recited in claim 12, wherein said means for providing a digital signature comprises a processor implementing an RSA algorithm.
14. An apparatus as recited in claim 12, wherein said public key and the corresponding private key are associated with a plurality of SPs.
15. An apparatus as recited in claim 1, wherein said means for applying conditional access comprises:
means for selecting program bearing packets comprising a program requested by the customer;
means for encrypting said selected program bearing packets according to a first encryption algorithm using a first key;
means for encrypting said first key according to a second encryption algorithm using a second key;
means for hashing said first key concatenated with said second key according to a hashing function such that the STU can determine the authenticity of said first key;
means for providing the encrypted said first key and the hash of said first key concatenated with said second key to the customer over the digital network;
means for encrypting said second key according to a third encryption algorithm using a third key corresponding to a private key stored within the STU associated with the customer;
means for providing a digital signature based on said second key such that the STU can verify the source of said second key; and, means for providing the encrypted said second key and the digital signature to the customer.
16. An apparatus as recited in claim 15, wherein said means for encrypting said selected program bearing packets comprises at least one processor implementing a DES
encryption algorithm.
17. An apparatus as recited in claim 15 wherein said means for encrypting said first key comprises at least one processor implementing a Triple-DES encryption algorithm.
18. An apparatus as recited in claim 15, wherein said means for hashing comprises a processor implementing a Message Digest 5 hashing function.
19. An apparatus as recited in claim 15, wherein said third encryption algorithm comprises a public-key encryption algorithm and further wherein said third key comprises a public-key corresponding to said private key stored within the STU.
20. An apparatus as recited in claim 19, wherein said means for encrypting said second key comprises a processor implementing an RSA algorithm.
21. An apparatus as recited in claim 15, wherein said means for providing a digital signature comprising a processor implementing an RSA algorithm.
22. An apparatus as recited in claim 1, wherein said first network protocol comprises one of fiber-distributed data interface (FDDI), SONET-ATM, UNISON-1, and DS-3.
23. An apparatus as recited in claim 1, wherein said second network protocol comprises one of fiber-distributed data interface (FDDI), SONET-ATM, UNISON-1, and DS-3.
24. In a digital video delivery system, wherein a plurality of programs are stored at a server in a transport packet format and delivered in a first protocol format to a network for delivery to a subscriber, a method for linking the server to the network and applying conditional access to the transport packets comprising:
selecting program bearing packets comprising a program requested by the customer;

encrypting said selected program bearing packets according to a first encryption algorithm using a first key;
encrypting said first key according to a second encryption algorithm using a second key;
providing the encrypted said first key to the customer;
encrypting said second key according to a public-key encryption algorithm using a public key corresponding to a private key stored within the STU associated with the customer; and, providing the encrypted said second key to the customer.
25. A method as recited in claim 24 further comprising the step of acquiring said public-key from a public-key database maintained by a conditional access authority.
26. A method as recited in claim 24, wherein said step of encrypting said selected program bearing packets comprises a DES encryption algorithm.
27. A method as recited in claim 24, wherein said step of encrypting said first key comprises a Triple-DES
encryption algorithm.
28. A method as recited in claim 24, wherein said step of encrypting said second key comprises an RSA
algorithm.
29. A method as recited in claim 24, wherein said step of applying conditional access further comprises the step of hashing said first key concatenated with said second key according to a hashing function such that the STU can determine the authenticity of said first key.
30. A method as recited in claim 24, wherein said step of hashing comprises a Message Digest 5 hashing function.
31. A method as recited in claim 24, wherein said step of applying conditional access further comprises the step of providing a digital signature based on said second key concatenated with a private key corresponding to a public key associated with said SP such that the STU can verify the source of said second key.
32. A method as recited in claim 31, wherein said step of providing a digital signature comprises an RSA
algorithm.
33. A method as recited in claim 31, wherein said public key and the corresponding private key are associated with a plurality of SPs.
34. In a digital video delivery system, wherein a plurality of programs are stored at a server in a transport packet format and delivered in a first protocol format to a network for delivery to a subscriber, a method for linking the server to the network and applying conditional access to the transport packets comprising:
receiving transport packets embedded in a first network level protocol;
removing the transport packets from said first network level protocol;
or each transport packet, determining if conditional access should be added;
applying conditional access to said packets; and, outputting the packets in one of the first network protocol and a second network protocol.
35. In a digital information delivery system wherein a plurality of programs are stored in a transport packet format and are delivered to a network for transmission to an authorized customer, a method for applying conditional access to the transport packets comprising the steps of:
(a) selecting packets comprising a program requested by a customer;
(b) encrypting the program bearing transport packets according to a first encryption algorithm using a first key;
(c) outputting the encrypted transport packets for delivery to the authorized customer over the digital network;
(d) encrypting said first key according to a second encryption algorithm using a second key;
(e) generating a message authentication code comprising a hash of said first key and said second key according to a hashing function;
(f) providing the encrypted said first key and said message authentication code to the authorized customer over the digital network;
(g) encrypting said second key according to a third encryption algorithm using a third key;
(h) applying a digital signature to the encrypted said second key such that the authorized customer can verify the origin of the encrypted said second key; and, (i) providing the encrypted and digitally signed said second key to the authorized customer over the digital network.
36. A method as recited in claim 35, wherein the packets are encrypted according to a DES algorithm.
37. A method as recited in claim 35, wherein the first keys are encrypted according to a Triple-DES
algorithm.
38. A method as recited in claim 35, wherein the second keys are encrypted according to a public-key cryptographic technique.
39. A method as recited in claim 38, wherein the public-key cryptographic technique implements an RSA
algorithm.
40. A method as recited in claim 35, wherein the application of the message authentication code comprises the steps of concatenating the first key and the second key;
and, hashing the concatenated keys in accordance with a hashing function to produce said message authentication code.
41. A method as recited in claim 40, wherein the hashing function comprises a Message Digest 5 function.
42. A method as recited in claim 35, wherein step (h) further comprises the steps of:
(i) hashing a message that is comprised of the second key;
(ii) encrypting the hash message with a public-key encryption algorithm using a private key associated with the SP, wherein the private key has a corresponding public key that is provided to the STU; and, (iii) transmitting the encrypted hashed message to the authorized customer.
43. In a digital transmission system wherein groups of program bearing packets are transmitted over a digital network between a service provider at a transmission site and a customer having a reception site, a method of selectively providing conditional access to the program within said program bearing packets comprising the steps of:

at the transmission site:
(a) selecting packets bearing a particular program that are to be delivered to at least one selected customer;
(b) encrypting at least a portion of the selected packets with a first key using a first encryption algorithm;
(c) encrypting said first key with a second key using a second encryption algorithm;
(d) generating a message authentication code for the first key comprising a hash of a concatenation of said second key with said first key according to a hashing function;
(e) generating an entitlement control message comprising a concatenation of said message authentication code and said first key;
(f) generating a digital signature for said second key comprising a hash of said second key according to a hashing function and encrypting said hash of said second key with a private key associated with the SP, said private key having a public-key counterpart, in accordance with a public key encryption algorithm;
(g) forming an entitlement management message comprising said encrypted key and said digital signature;
(h) encrypting at least a portion of said entitlement management message with a public key according to a public-key encryption algorithm, wherein said public key is associated with said at least one selected customer;
(i) multiplexing said selected program bearing packets, said entitlement control messages, and said entitlement management message into said digital network for reception by said at least one customer's reception site;
at the reception site:
(j) receiving said selected program bearing packets, said entitlement control messages, and said entitlement management messages at said at least one customer's reception site;

(k) recovering said second key from said entitlement management message by:
decrypting said encrypted portion of said entitlement management message using a private-key corresponding to said public key associated with said at least one selected customer;
retrieving said digital signature portion and decrypting said digital signature portion with a public-key counterpart to said private key associated with the SP;
retrieving said second key and hashing said second key;
authenticating said second key when said digital signature is equivalent to said hashed second key;
(1) recovering said first key from said entitlement control messages by:
decrypting said first key with said second key;
concatenating said first key and said second key;
generating a hash value by hashing said concatenated first key and said second key;
authenticating said first key when said hash value is equivalent to said message authentication code contained in said entitlement control message; and, (m) decrypting said selected packets bearing said particular program with said first key.
44. A method as recited in claim 43 further comprising the step of, at the transmission site, acquiring the public-key corresponding to said at least one customer from a public-key database maintained by a conditional access authority.
45. A method as recited in claim 43, wherein said first encryption algorithm comprises a DES encryption algorithm.
46. A method as recited in claim 43, wherein said second encryption algorithm comprises a Triple-DES
encryption algorithm.
47. A method as recited in claim 43, wherein said public-key encryption algorithm comprises an RSA encryption algorithm.
48. A method as recited in claim 43, wherein said hashing function comprises a Message Digest 5 hashing function.
49. A method as recited in claim 43 further comprising the step of periodically changing said first key.
50. A method as recited in claim 43 further comprising the step of periodically changing said second key.
51. In a digital transmission system wherein a plurality of service providers (SPs) transmit program bearing packets over a digital network for delivery to at least one selected customer, wherein the SPs add conditional access levels to program bearing packets by (a) encrypting a portion of said program packets with a first key using a first encryption algorithm; (b) encrypting said first key with a second key using a second encryption algorithm; (c) encrypting a portion of the second key with a public key using a public-key encryption algorithm, wherein said public key is associated with said at least one selected customer and wherein said public key has a private key counterpart;
and, (d) providing said program bearing packets, said first key, and said second key to said at least one customer, a method of recovering the program bearing packets at said at least one customer's reception site, comprising the steps of:
(a) receiving said selected program bearing packets, said first key, and said second key at said at least one customer's reception site;
(b) decrypting the encrypted said second key using said private-key corresponding to said public key associated with said at least one selected;
(c) decrypting said first key with said second key; and, (d) recovering said program bearing packets by decrypting said encrypted portion of said program bearing packets with said first key.
52. In a digital transmission system wherein a plurality of service providers (SPs) transmit program bearing packets over a digital network for delivery to at least one selected customer, wherein the plurality of SPs add conditional access levels to program bearing packets by (a) encrypting a portion of said program packets with a first key using a first encryption algorithm; (b) encrypting said first key with a second key using a second encryption algorithm and appending a message authentication code to said first key; (c) encrypting a portion of the second key with a public key using a public-key encryption algorithm, wherein said public key is associated with said at least one selected customer and wherein said public key has a private key counterpart, and appending a digital signature to said second key; and, (d) providing said program bearing packets, said first key and said appended message authentication code, and said second key and said appended digital signature to said at least one customer, a method of recovering the program bearing packets by said at least one customer's reception site, comprising the steps of:
(a) receiving said selected program bearing packets, said first key and said appended message authentication code, and said second key and said appended digital signature at said at least one customer's 6 reception site;
(b) decrypting the encrypted said second key using a private-key corresponding to said public key associated with said at least one selected customer with said inverse of said public-key encryption algorithm;
(c) authenticating said second key for use in decryption by matching the appended digital signature with a digital signature stored at the customer's reception site that corresponds to at least one of said plurality of SPs;
(d) decrypting said first key with said second key; (e) authenticating said first key for use in decryption by matching the appended message authentication code with a message authentication code generated at the customer's reception site; and, (f) decrypting said encrypted portion of said program bearing packets with said first key.
CA002237293A 1995-12-29 1996-08-22 Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers Abandoned CA2237293A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US08/580,759 1995-12-29
US08/580,759 US5870474A (en) 1995-12-04 1995-12-29 Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
PCT/US1996/013743 WO1997024832A1 (en) 1995-12-29 1996-08-22 Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers

Publications (1)

Publication Number Publication Date
CA2237293A1 true CA2237293A1 (en) 1997-07-10

Family

ID=29405931

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002237293A Abandoned CA2237293A1 (en) 1995-12-29 1996-08-22 Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers

Country Status (1)

Country Link
CA (1) CA2237293A1 (en)

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6895544B1 (en) 1999-06-12 2005-05-17 Samsung Electronics Co., Ltd. Encoding method of multimedia data and encoding device therefor
US10856020B2 (en) 2011-09-01 2020-12-01 Divx, Llc Systems and methods for distributing content using a common set of encryption keys
US10880620B2 (en) 2013-05-31 2020-12-29 Divx, Llc Playback synchronization across playback devices
US10893305B2 (en) 2014-04-05 2021-01-12 Divx, Llc Systems and methods for encoding and playing back video at different frame rates using enhancement layers
US10904594B2 (en) 2016-05-24 2021-01-26 Divx, Llc Systems and methods for providing variable speeds in a trick-play mode
US10917449B2 (en) 2013-03-15 2021-02-09 Divx, Llc Systems, methods, and media for delivery of content
US10931982B2 (en) 2011-08-30 2021-02-23 Divx, Llc Systems and methods for encoding and streaming video encoded using a plurality of maximum bitrate levels
US10979782B2 (en) 2012-08-31 2021-04-13 Divx, Llc System and method for decreasing an initial buffering period of an adaptive streaming system
US10992955B2 (en) 2011-01-05 2021-04-27 Divx, Llc Systems and methods for performing adaptive bitrate streaming
US11012641B2 (en) 2003-12-08 2021-05-18 Divx, Llc Multimedia distribution system for multimedia files with interleaved media chunks of varying types
US11017816B2 (en) 2003-12-08 2021-05-25 Divx, Llc Multimedia distribution system
US11044502B2 (en) 2016-05-24 2021-06-22 Divx, Llc Systems and methods for providing audio content during trick-play playback
US11050808B2 (en) 2007-01-05 2021-06-29 Divx, Llc Systems and methods for seeking within multimedia content during streaming playback
US11064235B2 (en) 2016-06-15 2021-07-13 Divx, Llc Systems and methods for encoding video content
US11102553B2 (en) 2009-12-04 2021-08-24 Divx, Llc Systems and methods for secure playback of encrypted elementary bitstreams
US11115450B2 (en) 2011-08-31 2021-09-07 Divx, Llc Systems, methods, and media for playing back protected video content by using top level index file
USRE48748E1 (en) 2011-06-29 2021-09-21 Divx, Llc Systems and methods for estimating available bandwidth and performing initial stream selection when streaming content
US11134115B2 (en) 2015-02-27 2021-09-28 Divx, Llc Systems and methods for frame duplication and frame extension in live video encoding and streaming
USRE48761E1 (en) 2012-12-31 2021-09-28 Divx, Llc Use of objective quality measures of streamed content to reduce streaming bandwidth
US11178435B2 (en) 2011-09-01 2021-11-16 Divx, Llc Systems and methods for saving encoded media streamed using adaptive bitrate streaming
US11178200B2 (en) 2013-12-30 2021-11-16 Divx, Llc Systems and methods for playing adaptive bitrate streaming content by multicast
US11190497B2 (en) 2011-08-31 2021-11-30 Divx, Llc Systems and methods for application identification
US11245938B2 (en) 2014-08-07 2022-02-08 Divx, Llc Systems and methods for protecting elementary bitstreams incorporating independently encoded tiles
US11272232B2 (en) 2013-05-31 2022-03-08 Divx, Llc Synchronizing multiple over the top streaming clients
US11343300B2 (en) 2017-02-17 2022-05-24 Divx, Llc Systems and methods for adaptive switching between multiple content delivery networks during adaptive bitrate streaming
US11349892B2 (en) 2015-01-06 2022-05-31 Divx, Llc Systems and methods for encoding and sharing content between devices
US11438394B2 (en) 2012-12-31 2022-09-06 Divx, Llc Systems, methods, and media for controlling delivery of content
US11457054B2 (en) 2011-08-30 2022-09-27 Divx, Llc Selection of resolutions for seamless resolution switching of multimedia content
US11470405B2 (en) 2013-05-30 2022-10-11 Divx, Llc Network video streaming with trick play based on separate trick play files
US11495266B2 (en) 2007-11-16 2022-11-08 Divx, Llc Systems and methods for playing back multimedia files incorporating reduced index structures
US11526582B2 (en) 2012-01-06 2022-12-13 Divx, Llc Systems and methods for enabling playback of digital content using status associable electronic tickets and ticket tokens representing grant of access rights
US11539780B2 (en) 2016-03-30 2022-12-27 Divx, Llc Systems and methods for quick start-up of playback
US11825142B2 (en) 2019-03-21 2023-11-21 Divx, Llc Systems and methods for multimedia swarms
US11849112B2 (en) 2013-03-15 2023-12-19 Divx, Llc Systems, methods, and media for distributed transcoding video data
US11886545B2 (en) 2006-03-14 2024-01-30 Divx, Llc Federated digital rights management scheme including trusted systems

Cited By (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6895544B1 (en) 1999-06-12 2005-05-17 Samsung Electronics Co., Ltd. Encoding method of multimedia data and encoding device therefor
US11017816B2 (en) 2003-12-08 2021-05-25 Divx, Llc Multimedia distribution system
US11355159B2 (en) 2003-12-08 2022-06-07 Divx, Llc Multimedia distribution system
US11735228B2 (en) 2003-12-08 2023-08-22 Divx, Llc Multimedia distribution system
US11735227B2 (en) 2003-12-08 2023-08-22 Divx, Llc Multimedia distribution system
US11159746B2 (en) 2003-12-08 2021-10-26 Divx, Llc Multimedia distribution system for multimedia files with packed frames
US11509839B2 (en) 2003-12-08 2022-11-22 Divx, Llc Multimedia distribution system for multimedia files with packed frames
US11297263B2 (en) 2003-12-08 2022-04-05 Divx, Llc Multimedia distribution system for multimedia files with packed frames
US11012641B2 (en) 2003-12-08 2021-05-18 Divx, Llc Multimedia distribution system for multimedia files with interleaved media chunks of varying types
US11886545B2 (en) 2006-03-14 2024-01-30 Divx, Llc Federated digital rights management scheme including trusted systems
US11050808B2 (en) 2007-01-05 2021-06-29 Divx, Llc Systems and methods for seeking within multimedia content during streaming playback
US11706276B2 (en) 2007-01-05 2023-07-18 Divx, Llc Systems and methods for seeking within multimedia content during streaming playback
US11495266B2 (en) 2007-11-16 2022-11-08 Divx, Llc Systems and methods for playing back multimedia files incorporating reduced index structures
US11102553B2 (en) 2009-12-04 2021-08-24 Divx, Llc Systems and methods for secure playback of encrypted elementary bitstreams
US10992955B2 (en) 2011-01-05 2021-04-27 Divx, Llc Systems and methods for performing adaptive bitrate streaming
US11638033B2 (en) 2011-01-05 2023-04-25 Divx, Llc Systems and methods for performing adaptive bitrate streaming
USRE48748E1 (en) 2011-06-29 2021-09-21 Divx, Llc Systems and methods for estimating available bandwidth and performing initial stream selection when streaming content
US11611785B2 (en) 2011-08-30 2023-03-21 Divx, Llc Systems and methods for encoding and streaming video encoded using a plurality of maximum bitrate levels
US10931982B2 (en) 2011-08-30 2021-02-23 Divx, Llc Systems and methods for encoding and streaming video encoded using a plurality of maximum bitrate levels
US11457054B2 (en) 2011-08-30 2022-09-27 Divx, Llc Selection of resolutions for seamless resolution switching of multimedia content
US11115450B2 (en) 2011-08-31 2021-09-07 Divx, Llc Systems, methods, and media for playing back protected video content by using top level index file
US11716371B2 (en) 2011-08-31 2023-08-01 Divx, Llc Systems and methods for automatically generating top level index files
US11190497B2 (en) 2011-08-31 2021-11-30 Divx, Llc Systems and methods for application identification
US11870758B2 (en) 2011-08-31 2024-01-09 Divx, Llc Systems and methods for application identification
US11683542B2 (en) 2011-09-01 2023-06-20 Divx, Llc Systems and methods for distributing content using a common set of encryption keys
US10856020B2 (en) 2011-09-01 2020-12-01 Divx, Llc Systems and methods for distributing content using a common set of encryption keys
US11178435B2 (en) 2011-09-01 2021-11-16 Divx, Llc Systems and methods for saving encoded media streamed using adaptive bitrate streaming
US11526582B2 (en) 2012-01-06 2022-12-13 Divx, Llc Systems and methods for enabling playback of digital content using status associable electronic tickets and ticket tokens representing grant of access rights
US10979782B2 (en) 2012-08-31 2021-04-13 Divx, Llc System and method for decreasing an initial buffering period of an adaptive streaming system
US11528540B2 (en) 2012-08-31 2022-12-13 Divx, Llc System and method for decreasing an initial buffering period of an adaptive streaming system
US11785066B2 (en) 2012-12-31 2023-10-10 Divx, Llc Systems, methods, and media for controlling delivery of content
US11438394B2 (en) 2012-12-31 2022-09-06 Divx, Llc Systems, methods, and media for controlling delivery of content
USRE48761E1 (en) 2012-12-31 2021-09-28 Divx, Llc Use of objective quality measures of streamed content to reduce streaming bandwidth
US11849112B2 (en) 2013-03-15 2023-12-19 Divx, Llc Systems, methods, and media for distributed transcoding video data
US10917449B2 (en) 2013-03-15 2021-02-09 Divx, Llc Systems, methods, and media for delivery of content
US11470405B2 (en) 2013-05-30 2022-10-11 Divx, Llc Network video streaming with trick play based on separate trick play files
US11765410B2 (en) 2013-05-31 2023-09-19 Divx, Llc Synchronizing multiple over the top streaming clients
US11272232B2 (en) 2013-05-31 2022-03-08 Divx, Llc Synchronizing multiple over the top streaming clients
US10880620B2 (en) 2013-05-31 2020-12-29 Divx, Llc Playback synchronization across playback devices
US11178200B2 (en) 2013-12-30 2021-11-16 Divx, Llc Systems and methods for playing adaptive bitrate streaming content by multicast
US11711552B2 (en) 2014-04-05 2023-07-25 Divx, Llc Systems and methods for encoding and playing back video at different frame rates using enhancement layers
US10893305B2 (en) 2014-04-05 2021-01-12 Divx, Llc Systems and methods for encoding and playing back video at different frame rates using enhancement layers
US11245938B2 (en) 2014-08-07 2022-02-08 Divx, Llc Systems and methods for protecting elementary bitstreams incorporating independently encoded tiles
US11349892B2 (en) 2015-01-06 2022-05-31 Divx, Llc Systems and methods for encoding and sharing content between devices
US11711410B2 (en) 2015-01-06 2023-07-25 Divx, Llc Systems and methods for encoding and sharing content between devices
US11134115B2 (en) 2015-02-27 2021-09-28 Divx, Llc Systems and methods for frame duplication and frame extension in live video encoding and streaming
US11824912B2 (en) 2015-02-27 2023-11-21 Divx, Llc Systems and methods for frame duplication and frame extension in live video encoding and streaming
US11539780B2 (en) 2016-03-30 2022-12-27 Divx, Llc Systems and methods for quick start-up of playback
US11044502B2 (en) 2016-05-24 2021-06-22 Divx, Llc Systems and methods for providing audio content during trick-play playback
US11895348B2 (en) 2016-05-24 2024-02-06 Divx, Llc Systems and methods for providing variable speeds in a trick-play mode
US10904594B2 (en) 2016-05-24 2021-01-26 Divx, Llc Systems and methods for providing variable speeds in a trick-play mode
US11546643B2 (en) 2016-05-24 2023-01-03 Divx, Llc Systems and methods for providing audio content during trick-play playback
US11483609B2 (en) 2016-06-15 2022-10-25 Divx, Llc Systems and methods for encoding video content
US11729451B2 (en) 2016-06-15 2023-08-15 Divx, Llc Systems and methods for encoding video content
US11064235B2 (en) 2016-06-15 2021-07-13 Divx, Llc Systems and methods for encoding video content
US11343300B2 (en) 2017-02-17 2022-05-24 Divx, Llc Systems and methods for adaptive switching between multiple content delivery networks during adaptive bitrate streaming
US11825142B2 (en) 2019-03-21 2023-11-21 Divx, Llc Systems and methods for multimedia swarms

Similar Documents

Publication Publication Date Title
US6424714B1 (en) Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers
EP0872077B1 (en) Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
CA2237293A1 (en) Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
JP4190599B2 (en) Information transmission device, information transmission method, information reception device, and information reception method
US5790543A (en) Apparatus and method for correcting jitter in data packets
US6028933A (en) Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network
AU687844B2 (en) Methods for providing conditional access information to decoders in a packet-based multiplexed communications system
US5473696A (en) Method and apparatus for combined encryption and scrambling of information on a shared medium network
US7739496B2 (en) Secure packet-based data broadcasting architecture
US6898285B1 (en) System to deliver encrypted access control information to support interoperability between digital information processing/control equipment
US6373952B2 (en) Data transmitting apparatus, data transmitting method, data receiving apparatus, data receiving method, data transmission apparatus, and data transmission method
US7447313B2 (en) Pointers to encrypted data in RTP header
EP1402679A2 (en) Security devices and processes for protecting and identifying messages
JP2007528678A (en) Transmission stream jitter remover
WO1999007149A1 (en) Source authentication of download information in a conditional access system
US5787089A (en) Digital signal broadcasting
CN1295763B (en) Transmission system
JP3794050B2 (en) Data transmission apparatus and method and data receiving apparatus
JP4119606B2 (en) Mechanism and apparatus for encapsulating registration permissions in a conditional access system
JPH10290222A (en) Information decoder, its method and information transmitter-receiver
JP4497099B2 (en) Information transmission equipment
JP2001217843A (en) Cryptocommunication protocol structure and enciphering ip packet format
EP1010325A1 (en) Method and apparatus for geographically limiting service in a conditional access system
EP1499062B1 (en) Individual video encryption system and method
Mao Broadband network delivery of interactive digital video using ATM

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued
FZDE Discontinued

Effective date: 20010822