EP1314314A2 - Method for addressing terminals - Google Patents

Method for addressing terminals

Info

Publication number
EP1314314A2
EP1314314A2 EP01969353A EP01969353A EP1314314A2 EP 1314314 A2 EP1314314 A2 EP 1314314A2 EP 01969353 A EP01969353 A EP 01969353A EP 01969353 A EP01969353 A EP 01969353A EP 1314314 A2 EP1314314 A2 EP 1314314A2
Authority
EP
European Patent Office
Prior art keywords
group
binary
terminals
terminal
vector
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP01969353A
Other languages
German (de)
French (fr)
Inventor
Jörg Schwenk
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Deutsche Telekom AG
Original Assignee
Deutsche Telekom AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Deutsche Telekom AG filed Critical Deutsche Telekom AG
Publication of EP1314314A2 publication Critical patent/EP1314314A2/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/163Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H60/00Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
    • H04H60/09Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
    • H04H60/14Arrangements for conditional access to broadcast information or to broadcast-related services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/4508Management of client data or end-user data
    • H04N21/4516Management of client data or end-user data involving client characteristics, e.g. Set-Top-Box type, software version or amount of memory available
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/454Content or additional data filtering, e.g. blocking advertisements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/64Addressing
    • H04N21/6402Address allocation for clients
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H2201/00Aspects of broadcast communication
    • H04H2201/70Aspects of broadcast communication characterised in that receivers can be addressed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming

Definitions

  • the invention relates to a method for addressing terminals for receiving television programs that are subject to a fee, the terminals being divided into groups each having a group address, and each of the terminals being assigned to an identifier within the group.
  • Terminals for receiving the fee-based programs are known as so-called set-top boxes or decoders. However, other end devices are also possible, such as PC cards or PCMCIA modules. Suitable terminals can also be integrated in the television receiver.
  • Chip cards are usually used as security modules, which are not permanently connected to the end device, but can also be removed from it. This allows one and that the same end device can be used by different users with an individual security module. In connection with the present invention, however, the terminal device itself is considered as the terminal device together with the security module that is used in each case.
  • DVB digital video broadcasting
  • other algorithms have also become known.
  • ECM Entitlement Control Messages
  • EMM Entitlement Management Messages
  • ADSL terrestrial broadcasting
  • EMMs can be addressed to individual customers or to groups of customers.
  • EMMs usually contain an SK service key in encrypted form. This service key is required to encrypt the control words in the ECMs undo.
  • EMMs can - if necessary partially - be encrypted or unencrypted, but are protected against manipulation with a cryptographic checksum (MAC).
  • MAC cryptographic checksum
  • Each group is given a group address and each customer is assigned an identifier by a position within the group. This position is given to the group address as a bitmap of size 256. If bit i in the bitmap is set to 1, this means that the EMM affects the customer who occupies position i in the group. A 0 means that the EMM does not affect the terminal with the respective position. Any subsets 1 to 256 of the group can thus be addressed.
  • the object of the present invention is to make the addressing of the end devices more secure.
  • the computing effort, in particular in the terminal or in the security module, should be as low as possible, since there may be a large number of incoming EMMs to be checked there.
  • This object is achieved in that the identifier is a binary vector, that the group address and a data word are sent to address terminals of a group and that the data word is formed by logically combining the binary vectors with a further binary vector, which describes, which of the group's end devices are to be addressed.
  • the linkage is carried out by forming a binary matrix from the binary vectors and by multiplying the binary matrix by the further vector. It is preferably provided that the further binary vector contains a binary position for each terminal in the group, which is set to a predetermined value when the terminal is to be addressed.
  • the data word according to the invention is preferably evaluated in that the
  • Terminal stored binary vector assigned to the terminal is multiplied by the transmitted data word and that the addressing is considered to have been made if this multiplication results in a predetermined binary value.
  • 1 is a flow chart to illustrate the method steps carried out by the transmitter, 2 shows a flowchart to explain the method steps on the terminal side;
  • Fig. 4 shows the formation of the data word to be transmitted
  • Fig. 5 the evaluation of the transmitted data word.
  • FIGS. 1 and 2 represent parts of programs which run on the transmitter side and in the security module or terminal, insofar as they relate to the method according to the invention.
  • the vector u is read in, which indicates to which end devices an EMM is to be sent.
  • the vector u read represents a one-line matrix which is transformed into the matrix u at 2.
  • step 3 a matrix is read in, the rows of which each represent a binary vector of length k assigned to a terminal. Multiplying the inverted matrix A -1 by the matrix uT results in the data word x to be transmitted. This is added to 4 of the EMM to be transmitted. At 5, the EMM including the data word x is transmitted to the end devices via the respective medium. The program is then ended at 6 or repeated for addressing further end devices.
  • an EMM is recognized in the incoming data stream in the terminal and from this the data word is identified at 9 x separated.
  • the data word x is then multiplied by the stored individual vector vi of the terminal i.
  • the binary vectors v to v 5 of five terminals each form a row of a matrix A. This matrix is inverted and as
  • the matrix A -1 according to FIG. 4 is multiplied by the matrix uT, which means that the first, the second and the fifth terminal of this group are to be addressed. Multiplication creates another matrix x, which is added to the EMM as a data word.
  • FIG. 5 shows the test of the data word in the receiver using the same numerical example for the receiver whose binary vector is vj_. This vector stored in the security module is multiplied by the matrix x, which results in a 1 in the example shown.

Abstract

The invention relates to a method for addressing terminals for receiving television programs that are subject to charges, whereby the terminals are divided into groups each having a group address, and an identifier within the group is assigned to each of the terminals of each group. According to the invention, said identifier is a binary vector. The group address and a data item are sent in order to address terminals of a group. The data item is formed by logically linking the binary vectors with another binary vector that describes which of the terminals of the group should be addressed. The linking is preferably carried out by forming a binary matrix consisting of the binary vectors and by multiplying the binary matrix with the other vector.

Description

Verfahren zur Adressierung von Endgeräten Methods for addressing end devices
Beschreibungdescription
Die Erfindung betrifft ein Verfahren zur Adressierung von Endgeräten zum Empfang von gebührenpflichtigen Fernsehprogrammen, wobei die Endgeräte in Gruppen mit jeweils einer Gruppenadresse eingeteilt sind und jedem der Endgeräte jeweils einer Gruppe eine Kennung innerhalb der Gruppe zugeordnet ist.The invention relates to a method for addressing terminals for receiving television programs that are subject to a fee, the terminals being divided into groups each having a group address, and each of the terminals being assigned to an identifier within the group.
Bei Systemen zum Empfang von gebührenpflichtigenIn systems for receiving fee-based
Fernsehprogrammen - auch Pay-TV-Systeme genannt - ist sicherzustellen, daß die gebührenpflichtigen Programme nur von den dazu berechtigten Kunden empfangen werden können. Dies geschieht mit einer Verschlüsselung der Programminhalte, durch Speicherung von Empfangsrechten im Sicherheitsmodul desTelevision programs - also called pay-TV systems - must be ensured that the programs that are subject to fees can only be received by the authorized customers. This is done by encrypting the program content by storing reception rights in the security module of the
Endgerätes und durch Hinzufügen von Empfangsbedingungen zum Programm.Terminal and by adding reception conditions to the program.
Endgeräte zum Empfangen der gebührenpflichtigen Programme sind als sogenannte Set-Top-Boxen oder Decoder bekannt. Es sind jedoch auch andere Endgeräte möglich, wie beispielsweise PC- Karten oder PCMCIA-Module. Geeignete Endgeräte können auch in dem Fernsehempfänger integriert sein.Terminals for receiving the fee-based programs are known as so-called set-top boxes or decoders. However, other end devices are also possible, such as PC cards or PCMCIA modules. Suitable terminals can also be integrated in the television receiver.
Als Sicherheitsmodule werden meist Chipkarten verwendet, die nicht fest mit dem Endgerät verbunden sind, sondern auch aus diesem entfernt werden können. Dadurch kann ein und das gleiche Endgerät von verschiedenen Nutzern jeweils mit einem individuellen Sicherheitsmodul benutzt werden. Im Zusammenhang mit der vorliegenden Erfindung wird als Endgerät jedoch das Endgerät selbst zusammen mit dem jweils benutzten Sicherheitsmodul betrachtet.Chip cards are usually used as security modules, which are not permanently connected to the end device, but can also be removed from it. This allows one and that the same end device can be used by different users with an individual security module. In connection with the present invention, however, the terminal device itself is considered as the terminal device together with the security module that is used in each case.
Die Verschlüsselung der Programminhalte erfolgt unter Kontrolle eines sogenannten Kontrollwortes CW, wobei als Algorithmus im digitalen auf dem MPEG-2-Standard basierenden Fernsehen in Europa hauptsächlich der DVB (=digital video broadcasting) Common Scrambling Algorithmus zum Einsatz kommt. Es sind jedoch auch andere Algorithmen bekanntgeworden.The program contents are encrypted under the control of a so-called control word CW, the DVB (= digital video broadcasting) common scrambling algorithm being the main algorithm used in digital television based on the MPEG-2 standard in Europe. However, other algorithms have also become known.
Empfangsbedingungen werden einem Programm in Form sogenannter Entitlement Control Messages (ECM) hinzugefügt, die mit dem Programminhalt übertragen werden. Diese ECMs sind fest mit einem Programminhalt assoziiert. ECMs enthalten außer den Empfangsbedingungen auch das verschlüsselte Kontrollwort CW und eine kryptographische Prüfsumme MAC zur Verhinderung von Manipulationen.Reception conditions are added to a program in the form of so-called Entitlement Control Messages (ECM), which are transmitted with the program content. These ECMs are firmly associated with program content. In addition to the reception conditions, ECMs also contain the encrypted control word CW and a cryptographic checksum MAC to prevent tampering.
Empfangsrechte werden in Form sogenannter Entitlement Management Messages (EMM) im gleichen Medium (Kabel, Satellit, terrestrischer Rundfunk, ADSL) wie die Programminhalte übertragen. Sie sind jedoch nicht fest mit dem jeweiligen Programminhalt verknüpft, sondern mit der logischen Adresse des Endgerätes des Kunden bzw. mit derjenigen des Sicherheitsmoduls. EMMs können an einzelne Kunden adressiert werden oder an Gruppen von Kunden. EMMs enthalten meist neben den Empfangsrechten noch einen Service-Schlüssel SK in verschlüsselter Form. Dieser Service-Schlüssel wird dazu benötigt, die Verschlüsselung der Kontrollwörter in den ECMs rückgängig zu machen. EMMs können - gegebenenfalls teilweise - verschlüsselt oder unverschlüsselt sein, sind jedoch mit einer kryptographischen Prüfsumme (MAC) gegen Manipulationen geschützt. Eine Anwendung von CW, ECM und EMM ist beispielsweise in DE 196 30 707 AI beschrieben.Reception rights are transmitted in the form of so-called Entitlement Management Messages (EMM) in the same medium (cable, satellite, terrestrial broadcasting, ADSL) as the program content. However, they are not linked to the respective program content, but to the logical address of the customer's end device or that of the security module. EMMs can be addressed to individual customers or to groups of customers. In addition to the reception rights, EMMs usually contain an SK service key in encrypted form. This service key is required to encrypt the control words in the ECMs undo. EMMs can - if necessary partially - be encrypted or unencrypted, but are protected against manipulation with a cryptographic checksum (MAC). An application of CW, ECM and EMM is described for example in DE 196 30 707 AI.
In vielen derzeit eingesetzten Conditional Access Systemen existiert ein Mechanismus zur Adressierung von Teilmengen bestimmter Gruppen von Endgeräten. Dazu werden die Sicherheitsmodule aller Kunden in Gruppen festgelegter GrößenIn many conditional access systems currently in use there is a mechanism for addressing subsets of certain groups of end devices. For this purpose, the security modules of all customers in groups of fixed sizes
Q aufgeteilt, in der Regel 256=2 . Jede Gruppe erhält eine Gruppenadresse, und jedem Kunden wird eine Kennung durch eine Position innerhalb der Gruppe zugewiesen. Diese Position wird der Gruppenadresse als Bitmap der Größe 256 mitgegeben. Ist das Bit i in der Bitmap auf 1 gesetzt, so bedeutet dies, daß die EMM den Kunden betrifft, der in der Gruppe die Position i besetzt. Eine 0 besagt, daß die EMM das Endgerät mit der jeweiligen Position nicht betrifft. Es können somit beliebige Teilmengen 1 bis 256 der Gruppe adressiert werden.Q split, usually 256 = 2. Each group is given a group address and each customer is assigned an identifier by a position within the group. This position is given to the group address as a bitmap of size 256. If bit i in the bitmap is set to 1, this means that the EMM affects the customer who occupies position i in the group. A 0 means that the EMM does not affect the terminal with the respective position. Any subsets 1 to 256 of the group can thus be addressed.
Die Sicherheit dieses beschriebenen Verfahrens beruht nun darauf, daß die Bit aps in den EMMs nicht verändert werden können, wofür der MAC am Ende der EMM sorgt. Es sind jedoch Angriffe bekanntgeworden, bei denen der MAC gefälscht und somit auch eine Fälschung der Bitmap möglich wurde.The security of this described method is now based on the fact that the bit aps in the EMMs cannot be changed, which the MAC ensures at the end of the EMM. However, attacks have become known in which the MAC was falsified and the bitmap could also be falsified.
Aufgabe der vorliegenden Erfindung ist es, die Adressierung der Endgeräte -sicherer zu machen. Dabei soll der Rechenaufwand, insbesondere im Endgerät bzw. im Sicherheitsmodul, möglichst gering sein, da dort gegebenenfalls sehr viele eintreffende EMMs zu prüfen sind. Diese Aufgabe wird erfindungsgemäß dadurch gelöst, daß die Kennung ein binärer Vektor ist, daß zur Adressierung von Endgeräten einer Gruppe die Gruppenadresse und ein Datenwort gesendet werden und daß das Datenwort durch logische Verknüpfung der binären Vektoren mit einem weiteren binären Vektor gebildet wird, der beschreibt, welche der Endgeräte der Gruppe adressiert werden sollen.The object of the present invention is to make the addressing of the end devices more secure. The computing effort, in particular in the terminal or in the security module, should be as low as possible, since there may be a large number of incoming EMMs to be checked there. This object is achieved in that the identifier is a binary vector, that the group address and a data word are sent to address terminals of a group and that the data word is formed by logically combining the binary vectors with a further binary vector, which describes, which of the group's end devices are to be addressed.
Eine bezüglich des Rechenaufwandes besonders günstige Weiterbildung des erfindungsgemäßen Verfahrens besteht darin, daß die Verknüpfung durch Bildung einer binären Matrix aus den binären Vektoren und durch Multiplikation der binären Matrix mit dem weiteren Vektor vorgenommen wird. Dabei ist vorzugsweise vorgesehen, daß der weitere binäre Vektor für jedes Endgerät der Gruppe eine Binärstelle enthält, die auf einen vorgegebenen Wert gesetzt wird, wenn das Endgerät adressiert werden soll.A further development of the method according to the invention which is particularly advantageous in terms of computational complexity is that the linkage is carried out by forming a binary matrix from the binary vectors and by multiplying the binary matrix by the further vector. It is preferably provided that the further binary vector contains a binary position for each terminal in the group, which is set to a predetermined value when the terminal is to be addressed.
Im Endgerät bzw. im Sicherheitsmodul wird das erfindungsgemäße Datenwort vorzugsweise dadurch ausgewertet, daß der imIn the terminal or in the security module, the data word according to the invention is preferably evaluated in that the
Endgerät gespeicherte dem Endgerät zugeordnete binäre Vektor mit dem übertragenen Datenwort multipliziert wird und daß die Adressierung als vorgenommen gilt, wenn diese Multiplikation einen vorgegebenen binären Wert ergibt .Terminal stored binary vector assigned to the terminal is multiplied by the transmitted data word and that the addressing is considered to have been made if this multiplication results in a predetermined binary value.
Ein Ausführungsbeispiel der Erfindung ist in der Zeichnung anhand mehrerer Figuren dargestellt und in der nachfolgenden Beschreibung näher erläutert. Es zeigt:An embodiment of the invention is shown in the drawing using several figures and explained in more detail in the following description. It shows:
Fig. 1 ein Flußdiagramm zur Verdeutlichung der senderseitig durchgeführten Verfahrensschritte, Fig. 2 ein Flußdiagramm zur Erläuterung der endgeräteseitigen Verfahrensschritte,1 is a flow chart to illustrate the method steps carried out by the transmitter, 2 shows a flowchart to explain the method steps on the terminal side;
Fig. 3 die Bildung einer die binären Vektoren enthaltenden Matrix,3 shows the formation of a matrix containing the binary vectors,
Fig. 4 die Bildung des zu übertragenden Datenwortes undFig. 4 shows the formation of the data word to be transmitted and
Fig. 5 die Auswertung des übertragenen Datenwortes.Fig. 5 the evaluation of the transmitted data word.
Die in den Figuren 1 und 2 dargestellten Flußdiagramme stellen Teile von Programmen dar, welche senderseitig und im Sicherheitsmodul bzw. Endgerät ablaufen, soweit sie das erfindungsgemäße Verfahren betreffen. Senderseitig wird nach einem Start bei 1 der Vektor u eingelesen, der besagt, an welche Endgeräte eine EMM gesendet werden soll . Der eingelesene Vektor u stellt eine einzeilige Matrix dar, die bei 2 zur Matrix u transformiert wird.The flow diagrams shown in FIGS. 1 and 2 represent parts of programs which run on the transmitter side and in the security module or terminal, insofar as they relate to the method according to the invention. On the transmitter side, after starting at 1, the vector u is read in, which indicates to which end devices an EMM is to be sent. The vector u read represents a one-line matrix which is transformed into the matrix u at 2.
Im nächsten Verfahrensschritt 3 wird eine Matrix eingelesen, deren Zeilen jeweils einen einem Endgerät zugeordneten binären Vektor der Länge k darstellen. Durch Multiplikation der invertierten Matrix A -1 mit der Matrix uT entsteht das zu übertragende Datenwort x . Dieses wird bei 4 der zu übertragenden EMM hinzugefügt. Bei 5 wird die EMM einschließlich des Datenwortes x über das jeweilige Medium zu den Endgeräten übertragen. Danach wird bei 6 das Programm beendet bzw. zur Adressierung weiterer Endgeräte wiederholt.In the next method step 3, a matrix is read in, the rows of which each represent a binary vector of length k assigned to a terminal. Multiplying the inverted matrix A -1 by the matrix uT results in the data word x to be transmitted. This is added to 4 of the EMM to be transmitted. At 5, the EMM including the data word x is transmitted to the end devices via the respective medium. The program is then ended at 6 or repeated for addressing further end devices.
Im Endgerät wird nach einem Programmstart 7 bei 8 eine EMM im ankommenden Datenstrom erkannt und daraus bei 9 das Datenwort x separiert. Im Programmschritt 10 wird dann das Datenwort x mit dem gespeicherten individuellen Vektor vi des Endgerätes i multipliziert. Das Ergebnis b ist bei Adressierung des Endgerätes i=l, was bei 11 geprüft wird, worauf bei 12 die EMM mit den bekannten kryptographischen Methoden verarbeitet wird.After a program start 7 at 8, an EMM is recognized in the incoming data stream in the terminal and from this the data word is identified at 9 x separated. In program step 10, the data word x is then multiplied by the stored individual vector vi of the terminal i. The result b is i = 1 when the terminal is addressed, which is checked at 11, whereupon the EMM is processed at 12 using the known cryptographic methods.
Ist jedoch b=0, bedeutet dies, daß die empfangene EMM nicht für dieses Endgerät bestimmt ist. Das Programm wird dann bei 13 beendet, ohne daß eine weitere Bearbeitung der EMM erfolgt, also beispielsweise keine Freigabe des Endgerätes zum Empfang der jeweiligen Programme vorgenommen wird.However, if b = 0, this means that the received EMM is not intended for this terminal. The program is then ended at 13 without further processing of the EMM taking place, that is to say, for example, no release of the terminal for receiving the respective programs.
Bei dem in Fig. 3 dargestellten Zahlenbeispiel bilden die binären Vektoren v bis v5 von fünf Endgeräten jeweils eine Zeile einer Matrix A. Diese Matrix wird invertiert und alsIn the numerical example shown in FIG. 3, the binary vectors v to v 5 of five terminals each form a row of a matrix A. This matrix is inverted and as
Matrix A -1 gemäß Fig. 4 mi■t der Matriix uT multipliziert, welche besagt, daß das erste, das zweite und das fünfte Endgerät dieser Gruppe adressiert werden sollen. Durch Multiplikation entsteht eine weitere Matrix x , die als Datenwort der EMM angefügt wird.The matrix A -1 according to FIG. 4 is multiplied by the matrix uT, which means that the first, the second and the fifth terminal of this group are to be addressed. Multiplication creates another matrix x, which is added to the EMM as a data word.
Fig. 5 zeigt die Prüfung des Datenwortes im Empfänger anhand des gleichen Zahlenbeispiels für den Empfänger, dessen binärer Vektor vj_ ist. Dieser im Sicherheitsmodul gespeicherte Vektor wird mit der Matrix x multipliziert, was in dem dargestellten Beispiel eine 1 ergibt. FIG. 5 shows the test of the data word in the receiver using the same numerical example for the receiver whose binary vector is vj_. This vector stored in the security module is multiplied by the matrix x, which results in a 1 in the example shown.

Claims

Ansprüche Expectations
1. Verfahren zur Adressierung von Endgeräten zum Empfang von gebührenpflichtigen Fernsehprogrammen, wobei die Endgeräte in Gruppen mit jeweils einer Gruppenadresse eingeteilt sind und jedem der Endgeräte jeweils einer Gruppe eine Kennung innerhalb der Gruppe zugeordnet ist, dadurch gekennzeichnet, daß die Kennung ein binärer Vektor ist, daß zur Adressierung von Endgeräten einer Gruppe die Gruppenadresse und ein Datenwort gesendet werden und daß das Datenwort durch logische Verknüpfung der binären Vektoren mit einem weiteren binären Vektor gebildet wird, der beschreibt, welche der Endgeräte der Gruppe adressiert werden sollen.1. A method for addressing terminals for the reception of television programs which are subject to a fee, the terminals being divided into groups each having a group address and each of the terminals being assigned an identifier within the group to a group, characterized in that the identifier is a binary vector, that the group address and a data word are sent for addressing terminals of a group and that the data word is formed by logically combining the binary vectors with a further binary vector which describes which of the terminals of the group are to be addressed.
2. Verfahren nach Anspruch 1, dadurch gekennzeichnet, daß die Verknüpfung durch Bildung einer binären Matrix aus den binären Vektoren und durch Multiplikation der binären Matrix mit dem weiteren Vektor vorgenommen wird.2. The method according to claim 1, characterized in that the linkage is made by forming a binary matrix from the binary vectors and by multiplying the binary matrix with the further vector.
3. Verfahren nach Anspruch 2, dadurch gekennzeichnet, daß der weitere binäre Vektor für jedes Endgerät der Gruppe eine Binärstelle enthält, die auf einen vorgegebenen Wert gesetzt wird, wenn das Endgerät adressiert werden soll.3. The method according to claim 2, characterized in that the further binary vector contains a binary position for each terminal of the group, which is set to a predetermined value when the terminal is to be addressed.
4. Verfahren nach einem der Ansprüche 2 oder 3 , dadurch gekennzeichnet, daß der im Endgerät gespeicherte dem Endgerät zugeordnete binäre Vektor mit dem übertragenen Datenwort multipliziert wird und daß die Adressierung als vorgenommen gilt, wenn diese Multiplikation einen vorgegebenen binären Wert ergib . 4. The method according to any one of claims 2 or 3, characterized in that the binary vector stored in the terminal assigned to the terminal is multiplied by the transmitted data word and that the addressing is considered to have been carried out if this multiplication yields a predetermined binary value.
EP01969353A 2000-08-02 2001-07-09 Method for addressing terminals Withdrawn EP1314314A2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE10037630A DE10037630B4 (en) 2000-08-02 2000-08-02 Method for addressing terminals
DE10037630 2000-08-02
PCT/EP2001/007853 WO2002011323A2 (en) 2000-08-02 2001-07-09 Method for addressing terminals

Publications (1)

Publication Number Publication Date
EP1314314A2 true EP1314314A2 (en) 2003-05-28

Family

ID=7651063

Family Applications (1)

Application Number Title Priority Date Filing Date
EP01969353A Withdrawn EP1314314A2 (en) 2000-08-02 2001-07-09 Method for addressing terminals

Country Status (5)

Country Link
US (1) US7164766B2 (en)
EP (1) EP1314314A2 (en)
AU (1) AU2001289632A1 (en)
DE (1) DE10037630B4 (en)
WO (1) WO2002011323A2 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1545130A1 (en) * 2003-12-16 2005-06-22 Nagravision S.A. Process for updating access rights to conditional access data
CN100525434C (en) * 2005-12-31 2009-08-05 华为技术有限公司 Method for granting power to user in receiving system under digital TV condition
US20090165074A1 (en) * 2007-12-21 2009-06-25 General Instrument Corporation Multi-Address Message Addressing
EP2334069A1 (en) * 2009-12-11 2011-06-15 Irdeto Access B.V. Providing control words to a receiver
CA2938904C (en) 2014-02-06 2023-08-01 Brett Shellhammer System, methods, and devices for addressed data communications

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE500950C2 (en) * 1993-02-18 1994-10-03 Info Dev & Patent Ab Procedure for information transfer and device for carrying out the procedure
US5539822A (en) * 1994-04-19 1996-07-23 Scientific-Atlanta, Inc. System and method for subscriber interactivity in a television system
US5657470A (en) * 1994-11-09 1997-08-12 Ybm Technologies, Inc. Personal computer hard disk protection system
JPH096706A (en) * 1995-06-22 1997-01-10 Hitachi Ltd Loosely coupled computer system
US6052781A (en) * 1997-02-21 2000-04-18 Savvy Frontiers Property Trust Multiple user computer including anti-concurrent user-class based disjunctive separation of plural hard drive operation
ID23380A (en) * 1997-03-21 2000-04-20 Canal & Siciete Anonyme METHODS AND APARATUS FOR PREVENTING CHEAT ACCESS IN REQUIRED ACCESS SYSTEMS
BR9714627A (en) * 1997-03-21 2002-08-06 Canal Plus Sa Diffusion and reception system, and receiver / decoder set and remote controller for it
ATE232670T1 (en) * 1997-03-21 2003-02-15 Canal Plus Technologies CHIP CARD AND RECEIVER FOR RECEIVING ENCRYPTED BROADCAST SIGNALS
US7515712B2 (en) * 1997-08-01 2009-04-07 Cisco Technology, Inc. Mechanism and apparatus for encapsulation of entitlement authorization in conditional access system
FR2769779B1 (en) * 1997-10-14 1999-11-12 Thomson Multimedia Sa METHOD FOR CONTROLLING ACCESS TO A HOME NETWORK AND DEVICE IMPLEMENTING THE METHOD
DE69834253T2 (en) * 1998-10-21 2007-02-01 Alcatel A system and method for executing a particular command between the first and second terminals

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0211323A2 *

Also Published As

Publication number Publication date
WO2002011323A2 (en) 2002-02-07
US20030128846A1 (en) 2003-07-10
AU2001289632A1 (en) 2002-02-13
DE10037630A1 (en) 2002-03-28
DE10037630B4 (en) 2008-02-07
US7164766B2 (en) 2007-01-16
WO2002011323A3 (en) 2003-03-13

Similar Documents

Publication Publication Date Title
DE10212656A1 (en) Selective encryption of multimedia data
DE69719803T3 (en) PREVENT PLAY ATTACKS FROM DIGITAL INFORMATION DISTRIBUTED BY NETWORK SERVICE PROVIDERS
DE60026964T2 (en) ADDRESS ALLOCATION IN A DIGITAL TRANSMISSION SYSTEM
DE69902527T3 (en) ADJUSTMENT DEVICE BETWEEN A RECEIVER AND A SAFETY MODULE
DE60034064T2 (en) DEVICE AND METHOD FOR DIGITAL TELEVISION
DE60217576T2 (en) Devices and methods for transmitting and implementing control instructions for accessing receiver functionalities
DE69912550T2 (en) Method and system for the controlled delivery of digital multimedia services
DE3124150A1 (en) TWO-LEVEL ENCRYPTION SYSTEM FOR RF SIGNALS
DE69927581T2 (en) NETWORKED UNIT WITH CONDITIONAL ACCESS
DE60002921T2 (en) INTERFACE AND DECODING DEVICE FOR A HOST SYSTEM
WO1999008446A1 (en) Transcoder for decoding encoded tv programs
DE10037630B4 (en) Method for addressing terminals
DE60113306T2 (en) PROCESS AND DEVICE IS APPROVED IN THE UNAUTHORIZED TIME OF TIME IN AN ADDRESSABLE PAYMENT SYSTEM
DE60017589T2 (en) METHOD AND SYSTEM FOR INSERTING A SYSTEM WITH CONDITIONAL ACCESS
WO2001060036A1 (en) Decoder, decoding method and a chip card
EP0822719B1 (en) Methods and arrangements for preventing unauthorised use of distribution networks
WO2002017248A1 (en) Chip card
DE102005060288A1 (en) Digital free-to-air receiver conditional access system operating method, involves communicating receiver-external part with receiver via interface to read card, and verifying access authorization stored on card according to access system
DE60218315T2 (en) METHOD FOR LOCALLY RECORDING DIGITAL DATA FOR DIGITAL TELEVISION
DE102005060287B4 (en) Method of operating a conditional access system
WO1999021361A1 (en) Method and device for relaying specific data, especially receiving rights, to a pay television terminal
EP1083749A2 (en) System and equipment for selective datatransmission over a broadcast system
DE10244079A1 (en) Method for preparing an encoded IP-based group service e.g. multi-cast service, involves sending safety data file at given times via IP-group address to subscribers
EP1329050A2 (en) Module for secure transmission of data
DE102004042094B3 (en) Digital data transmission method such as for pay TV using a single use code

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

17P Request for examination filed

Effective date: 20030915

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20120201