WO1999019822A3 - System and method for discovering compromised security devices - Google Patents

System and method for discovering compromised security devices Download PDF

Info

Publication number
WO1999019822A3
WO1999019822A3 PCT/US1998/019352 US9819352W WO9919822A3 WO 1999019822 A3 WO1999019822 A3 WO 1999019822A3 US 9819352 W US9819352 W US 9819352W WO 9919822 A3 WO9919822 A3 WO 9919822A3
Authority
WO
WIPO (PCT)
Prior art keywords
clients
decoding capabilities
illicitly
authorized
decoding
Prior art date
Application number
PCT/US1998/019352
Other languages
French (fr)
Other versions
WO1999019822A2 (en
Inventor
Kenneth J Birdwell
Yacov Yacobi
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to JP2000516305A priority Critical patent/JP2003502719A/en
Priority to EP98963737A priority patent/EP1031206A2/en
Publication of WO1999019822A2 publication Critical patent/WO1999019822A2/en
Publication of WO1999019822A3 publication Critical patent/WO1999019822A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/173Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
    • H04N7/17345Control of the passage of the selected programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/109Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26606Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44236Monitoring of piracy processes or activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Virology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

A data delivery system has a content server or other mechanism for delivering encoded content to multiple authorized clients. The authorized clients are equipped with security devices having decoding capabilities to decode the content. Unauthorized clients are prevented from decoding the content because they are not supplied with the decoding capabilities. As part of the data delivery system, a traitor detection system is provided to discover an identity of an authorized client that has been compromised and is illicitly transferring decoding capabilities to unauthorized clients. The traitor detection system generates different decoding capabilities and creates an association file which relates the different decoding capabilities to different authorized clients. The decoding capabilities are traced to determine which of them is illicitly transferred to an illegitimate user. In the event that one of the decoding capabilities is illicitly transferred, the traitor detection system consults the association file to identify one or more of the authorized clients that were originally supplied with the illicitly transferred decoding capabilities. The identified set of clients includes the compromised client. The process is repeated for the identified set of clients with a new set of decoding capabilities to successively narrow the field of possible pirating clients, until the compromised security device is precisely pinpointed.
PCT/US1998/019352 1997-10-14 1998-09-16 System and method for discovering compromised security devices WO1999019822A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2000516305A JP2003502719A (en) 1997-10-14 1998-09-16 System and method for discovering security devices
EP98963737A EP1031206A2 (en) 1997-10-14 1998-09-16 System and method for discovering compromised security devices

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US94943897A 1997-10-14 1997-10-14
US08/949,438 1997-10-14

Publications (2)

Publication Number Publication Date
WO1999019822A2 WO1999019822A2 (en) 1999-04-22
WO1999019822A3 true WO1999019822A3 (en) 1999-06-17

Family

ID=25489083

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/019352 WO1999019822A2 (en) 1997-10-14 1998-09-16 System and method for discovering compromised security devices

Country Status (3)

Country Link
EP (1) EP1031206A2 (en)
JP (1) JP2003502719A (en)
WO (1) WO1999019822A2 (en)

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7415110B1 (en) 1999-03-24 2008-08-19 Intel Corporation Method and apparatus for the generation of cryptographic keys
JP2000330783A (en) 1999-05-20 2000-11-30 Nec Corp Software illegal copy prevention system and recording medium with software illegal copy prevention program recorded thereon
KR20010004791A (en) * 1999-06-29 2001-01-15 윤종용 Apparatus for securing user's informaton and method thereof in mobile communication system connecting with internet
GB2353682B (en) * 1999-07-15 2004-03-31 Nds Ltd Key management for content protection
IL130963A (en) 1999-07-15 2006-04-10 Nds Ltd Key management for content protection
US6947558B1 (en) 1999-08-29 2005-09-20 Intel Corporation Stream cipher having a shuffle network combiner function
US6731758B1 (en) 1999-08-29 2004-05-04 Intel Corporation Digital video content transmission ciphering and deciphering method and apparatus
US7068786B1 (en) 1999-08-29 2006-06-27 Intel Corporation Dual use block/stream cipher
US6920221B1 (en) 1999-08-29 2005-07-19 Intel Corporation Method and apparatus for protected exchange of status and secret values between a video source application and a video hardware interface
US6477252B1 (en) * 1999-08-29 2002-11-05 Intel Corporation Digital video content transmission ciphering and deciphering method and apparatus
US6289455B1 (en) 1999-09-02 2001-09-11 Crypotography Research, Inc. Method and apparatus for preventing piracy of digital content
EP1111924A1 (en) 1999-12-22 2001-06-27 Irdeto Access B.V. Method for controlling the use of a program signal in a broadcast system, and control device for a receiver for carrying out such a method
EP1111923A1 (en) * 1999-12-22 2001-06-27 Irdeto Access B.V. Method for operating a conditional access system for broadcast applications
US7003107B2 (en) 2000-05-23 2006-02-21 Mainstream Encryption Hybrid stream cipher
FR2811505B1 (en) * 2000-07-06 2002-12-06 At Sky ONLINE AND OFFLINE DIGITAL DATA ACCESS CONTROL SYSTEM USING SOFTWARE KEY SERVER
FR2811503B1 (en) * 2000-07-07 2002-12-06 Innovatron Sa METHOD FOR DELIVERING AUDIO, VIDEO OR TEXT SEQUENCES BY TELETRANSMISSION OF INDIVIDUALLY TATTOOED DIGITAL DATA ACCORDING TO THE RECIPIENT
US9520993B2 (en) 2001-01-26 2016-12-13 International Business Machines Corporation Renewable traitor tracing
US7505593B2 (en) 2002-12-09 2009-03-17 International Business Machines Corporation Method for tracing traitors and preventing piracy of digital content in a broadcast encryption system
US7103184B2 (en) 2002-05-09 2006-09-05 Intel Corporation System and method for sign mask encryption and decryption
FR2856539A1 (en) * 2003-06-17 2004-12-24 France Telecom Broadcasted information encryption and/or decryption tracing method, involves implementing secret cryptographic function by multiple decoders, each including memory storing mathematical description of function
JP2005079864A (en) * 2003-08-29 2005-03-24 Toshiba Corp Broadcast device, receiving device, broadcast method and receiving method
GB2419222B (en) * 2004-10-15 2007-05-30 Zootech Ltd Copy deterrent for an audiovisual product
US8161296B2 (en) * 2005-04-25 2012-04-17 Samsung Electronics Co., Ltd. Method and apparatus for managing digital content
JP2006311625A (en) * 2006-08-18 2006-11-09 Toshiba Corp Broadcast device, receiving device, broadcast method and receiving method
US20090202079A1 (en) * 2008-02-11 2009-08-13 Nokia Corporation Method, apparatus and computer program product for providing mobile broadcast service protection
JP2010104035A (en) * 2010-01-25 2010-05-06 Toshiba Corp Receiver, and receiving method
JP2010119138A (en) * 2010-02-15 2010-05-27 Toshiba Corp Receiving device and method
JP6018880B2 (en) * 2012-11-05 2016-11-02 日本放送協会 ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION PROGRAM, AND DECRYPTION PROGRAM
US9936008B2 (en) * 2013-12-03 2018-04-03 Red Hat, Inc. Method and system for dynamically shifting a service

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHOR B ET AL: "Tracing traitors", ADVANCES IN CRYPTOLOGY - CRYPTO '94. 14TH ANNUAL INTERNATIONAL CRYPTOLOGY CONFERENCE. PROCEEDINGS, ADVANCES IN CRYPTOLOGY - CRYPTO '94. 14TH INTERNATIONAL CRYPTOLOGY CONFERENCE PROCEEDINGS, SANTA BARBARA, CA, USA, 21-25 AUG. 1994, ISBN 3-540-58333-5, 1994, Berlin, Germany, Springer-Verlag, Germany, pages 257 - 270, XP002097845 *

Also Published As

Publication number Publication date
WO1999019822A2 (en) 1999-04-22
EP1031206A2 (en) 2000-08-30
JP2003502719A (en) 2003-01-21

Similar Documents

Publication Publication Date Title
WO1999019822A3 (en) System and method for discovering compromised security devices
Anderson et al. Chameleon—A new kind of stream cipher
EP1913774B1 (en) Multimedia data protection
US6000030A (en) Software fingerprinting and branding
EP2088705B1 (en) System and method for protecting data streams in hardware components
EP1444561B1 (en) Method, apparatus and system for securely providing digital content
US20160210444A1 (en) Method and apparatus for delivering encoded content
EP1134977A1 (en) Method and system for providing copies of scrambled content with unique watermarks, and system for descrambling scrambled content
CN101977190B (en) Digital content encryption transmission method and server side
KR101342743B1 (en) Method for controlling access to encrypted data
WO2005119557A2 (en) Secure communication and real-time watermarking using mutating identifiers
TW369753B (en) Data security method and system
CN105357190A (en) Method and system for performing authentication on access request
RU2477572C2 (en) Conditional access system
EP1134930A3 (en) Information providing apparatus and method, information processing apparatus and method, and program storage medium
AU2002351508A1 (en) Method, apparatus and system for securely providing material to a licensee of the material
US20190012439A1 (en) Systems and Methods for Preserving Privacy in Distribution of Digital Content Using Private Tokens
US7006658B2 (en) Varying segment sizes to increase security
CN1257629C (en) Method and appts. for secure transmission of data
CN100571121C (en) Tracing pirate in the wireless digital copyright management system and recognition methods
KR20100092945A (en) Method and system for the secure distribution of audiovisual data by transactional marking
EP2690593A1 (en) Method for marking and transmitting a content and method for detecting an identifyier of said content
US8943312B2 (en) Method of and system for authenticating online read digital content
EP2697979B1 (en) Method to identify the origin of a security module in pay-tv decoder system
CN101079693A (en) A method and system for improving security of virtual commodity

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

AK Designated states

Kind code of ref document: A3

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref country code: JP

Ref document number: 2000 516305

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 1998963737

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1998963737

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1998963737

Country of ref document: EP