Authorization of services in a conditional access system

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S002000, C380S223000

Reexamination Certificate

active

06252964

ABSTRACT:

FIELD OF THE INVENTION
The invention concerns systems for protecting information and more particularly concerns systems for protecting information that is transmitted by means of a wired or wireless medium against unauthorized access.
BACKGROUND OF THE INVENTION
One way of distributing information is to broadcast it, that is, to place the information on a medium from which it can be received by any device that is connected to the medium. Television and radio are well-known broadcast media. If one wishes to make money by distributing information on a broadcast medium, there are a couple of alternatives. A first is to find sponsors to pay for broadcasting the information. A second is to permit access to the broadcast information only to those who have paid for it. This is generally done by broadcasting the information in scrambled or encrypted form. Although any device that is connected to the medium can receive the scrambled or encrypted information, only the devices of those users who have paid to have access to the information are able to unscramble or decrypt the information.
A service distribution organization, for example a CATV company or a satellite television company, provides its subscribers with information from a number of program sources, that is, collections of certain kinds of information. For example, the History Channel is a program source that provides television programs about history. Each program provided by the History Channel is an “instance” of that program source. When the service distribution organization broadcasts an instance of the program source, it encrypts or scrambles the instance to form encrypted instance. An encrypted instance contains instance data, which is the encrypted information making up the program.
An encrypted instance is broadcast over a transmission medium. The transmission medium may be wireless or it may be “wired”, that is, provided via a wire, a coaxial cable, or a fiber optic cable. It is received in a large number of set top boxes. The function of set-top box is to determine whether encrypted instance should be decrypted and, if so, to decrypt it to produce a decrypted instance comprising the information making up the program. This information is delivered to a television set. Known set top boxes include decryptors to decrypt the encrypted instance.
Subscribers generally purchase services by the month (though a service may be a one-time event), and after a subscriber has purchased a service, the service distribution so organization sends the set top box belonging to the subscriber messages required to provide the authorization information for the purchased services. Authorization information may be sent with the instance data or may be sent via a separate channel, for example, via an out-of-band RF link, to a set top box. Various techniques have been employed to encrypt the authorization information. Authorization information may include a key for a service of the service distribution organization and an indication of what programs in the service the subscriber is entitled to watch. If the authorization information indicates that the subscriber is entitled to watch the program of an encrypted instance, the set-top box decrypts the encrypted instance.
It will be appreciated that “encryption” and “scrambling” are similar processes and that “decryption” and “descrambling” are similar processes; a difference is that scrambling and descrambling are generally analog in nature, while encryption and description processes are usually digital.
The access restrictions are required in both analog and digital systems. In all systems, the continued technological improvements being used to overcome the access restrictions require more secure and flexible access restrictions. As more systems switch from an analog format to a digital format, or a hybrid system containing both analog and digital formats, flexible access restrictions will be required.
Restricting access to broadcast information is even more important for digital information. One reason for this is that each copy of digital information is as good as the original; another is that digital information can be compressed, and consequently, a given amount of bandwidth carries much more information in digital form; a third is that the service distribution organizations are adding reverse paths which permit a set-top box to send a message to the service distribution organization, thereby permitting various interactive services. Thus, the service distribution organizations require access restrictions which are both more secure and more flexible than those in conventional systems


REFERENCES:
patent: 5509073 (1996-04-01), Monnin
patent: 5742677 (1998-04-01), Pinder et al.
patent: 5787172 (1998-07-01), Arnold et al.
patent: 5862220 (1999-01-01), Perlman
patent: 5870474 (1999-02-01), Wasilewski et al.
patent: 6005938 (1999-12-01), Banker et al.
Louis Claude Guillou and Jean-Luc Giachetti, “Encipherment and Conditional Access”, SMPTE Journal, 103 (1994) Jun., No. 6, White Plains, NY, 1994.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authorization of services in a conditional access system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authorization of services in a conditional access system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authorization of services in a conditional access system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2478257

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.