EP0515448A1 - Apparatus and method for controlling access to broadcast signals - Google Patents

Apparatus and method for controlling access to broadcast signals

Info

Publication number
EP0515448A1
EP0515448A1 EP19910903871 EP91903871A EP0515448A1 EP 0515448 A1 EP0515448 A1 EP 0515448A1 EP 19910903871 EP19910903871 EP 19910903871 EP 91903871 A EP91903871 A EP 91903871A EP 0515448 A1 EP0515448 A1 EP 0515448A1
Authority
EP
European Patent Office
Prior art keywords
key
deciphering
ciphered
message
broadcast
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP19910903871
Other languages
German (de)
French (fr)
Inventor
William Mcmullan Hawthorne
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Enfranchise Sixty Ltd
Original Assignee
Enfranchise Sixty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Enfranchise Sixty Ltd filed Critical Enfranchise Sixty Ltd
Publication of EP0515448A1 publication Critical patent/EP0515448A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H60/00Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
    • H04H60/09Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
    • H04H60/14Arrangements for conditional access to broadcast information or to broadcast-related services
    • H04H60/23Arrangements for conditional access to broadcast information or to broadcast-related services using cryptography, e.g. encryption, authentication, key distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H60/00Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
    • H04H60/76Arrangements characterised by transmission systems other than for broadcast, e.g. the Internet
    • H04H60/81Arrangements characterised by transmission systems other than for broadcast, e.g. the Internet characterised by the transmission system itself
    • H04H60/93Wired transmission systems
    • H04H60/94Telephonic networks

Definitions

  • This invention relates to the control of access to broadcast signals, particularly, but not exclusively, video services such as television programmes and broadcast data services such as financial and medical information services.
  • video services such as television programmes
  • broadcast data services such as financial and medical information services.
  • access control and regulation is of use in ensuring payment for selected broadcast services by subscribing users.
  • the control of access presents two problems.
  • the first problem is to provide a method of distorting, scrambling or otherwise enciphering the broadest signal so that it becomes substantially meaningless to a non- subscribing viewer, and at the same time the method should be strong in terms of irreversibility so that it becomes very difficult or uneconomic to manufacture unauthorised or pirate devices for recreating the plain signal.
  • a number of suitable ciphers are known to those skilled in the communication arts.
  • the cipher should preferably be a key symmetric cipher.
  • the second problem is to provide a method and apparatus for ensuring that the user cannot continue to gain access after his subscription expires or his contract with the broadcasting agency ceases to be in force.
  • This problem is more difficult because the user has already been provided with a control device or decoder for use during his subscription period and may decline to return his decoder, necessitating expensive legal proceedings. Even if the cipher is changed at the end of each subscription period, the decoder itself constitutes a structure for reverse engineering by a potential manufacturer of pirate devices who will assume that the cipher changes will be trivial.
  • the problem is to provide such a control device which will for all practical purposes be useless after expiry of a subscription but which can be rendered operative again should the subscription subsequently be renewed.
  • An object of the present invention is to provide a method and apparatus which allows solution of this technical problem.
  • memory means for storing a first substantially unique key
  • first deciphering means activated by said first key to decipher said ciphered message by use of said first deciphering algorithm whereby the deciphered message constitutes a second key
  • second deciphering means activated by said second key to decipher a received ciphered broadcast video signal by use of said second deciphering algorithm.
  • the present invention also includes within its scope a method of controlling access to a broadcast signal, and independently a method of gaining local access to a broadcast signal, substantially as described herein with reference to, and as illustrated in, the accompanying drawings. Furthermore, the invention includes within its scope television receiver control apparatus substantially as described herein with reference to, and as illustrated in, the accompanying drawings.
  • Figure 1 is a block circuit diagram of an access control unit according to the invention, for use with a subscriber's television receiver;
  • Figure 2 is a flow chart of operation of a control method according to the invention.
  • FIG. 1 shows a control unit 10 for use with a television receiver 23 to control access to a video signal which is broadcast in ciphered form.
  • the control unit has an input 11 connected to the local TV antenna 12, and an output 13 connected to the television receiver antenna input socket 14.
  • the control unit is adapted to decipher a ciphered video signal received at its input 11 and to provide a deciphered plain video signal at its output 13.
  • the control unit 10 contains memory means 15 which includes a memory for storing a first key termed the Message or M-cipher key, and memories for storing first and second deciphering algorithms referred to as the M and V deciphering algorithms respectively.
  • the memory is suitably an integrated circuit chip. Before delivery to the user the memory chip is primed with the M and V deciphering algorithms and with a substantially unique M- -5-
  • the M-cipher key is suitably in the form of a serial number in the range of from 1 to 1,000,000,000,000 whereby the system can create up to a million million different ciphertext messages from a single plain text message and can thereby accommodate a million million subscribers.
  • the M-cipher is a key symmetric message cipher, i.e a cipher which, in response to activation by a key, converts an intelligible stream of letters and numbers, i.e the message, into an unintelligible stream, at d which also operates in reverse to convert the unintelligible stream back to the intelligible stream upon activation by an identical key.
  • the V-cipher is a key symmetric video cipher which applies the same properties of key activation and reversibility to a video signal.
  • the broadcast video signal is ciphered by use of the V- cipher key before transmission.
  • the ciphered broadcast video signal is thus common to all subscribers and there is no requirement to broadcast individualised coded video signals.
  • a user in possession of a primed control unit Upon payment or renewal of his subscription a user in possession of a primed control unit receives a ciphered message to allow him to enable the control unit.
  • the ciphered message is referred to as
  • Each message is in numerical form and consists of M-cipher ciphertext of the V-cipher key for the next broadcasting period from the pertinent broadcasting organisation.
  • Each UCI is substantially unique because it has been created by using the M-cipher key specific to each subscriber.
  • the control unit 10 is provided with data entry means 16 connected to a data input circuit 17 so that the user can enter his UCI message.
  • the data entry means can be a numerical keyboard or keypad, an alphanumeric keyboard, a slot to accept a coded card, a modem connected to a public telephone line or any other convenient arrangement.
  • the UCI message can be represented in print and sent to the subscriber by mail who then enters the number on the keyboard.
  • the UCI message can alternatively be embodied in a punched card, a magnetic strip card, a dumb memory card containing memory but no processor, or a smart memory card containing both a memory and a processor. These cards can be sent by mail to the user who then inserts the card in the slot in the control unit and the UCI message is transferred by means appropriate to the type of card, as known to those in the art.
  • the UCI message When the UCI message is embodied in print or on a card it can be sent by mail or the subscriber can apply to a vending station.
  • An alternative arrangement which offers greater flexibility is for the control unit to receive the UCI message through a modem or other device coupled to a public telephone line, in response to a telephoned request by the subscriber. This would allow an accounting and management system to be automatically linked to the existing telephone account billing system, and will also permit great flexibility in the terms and periods for each UCI message.
  • the UCI message When the UCI message is entered into the control unit it is deciphered by use of the unique M-cipher key stored in the local memory 15 in accordance with the M-deciphering algorithm also stored in the local memory 15, whereby to constitute the V-cipher key.
  • the deciphering is effected by a processor 18 connected through a latch 19 to the data input circuit 17. Because the UCI message is unique to that subscriber he cannot make use of any UCI message supplied to any other subscriber and nor can the other subscriber make use of the first subscriber's UCI message. If any such inappropriate UCI message is entered into a control unit it cannot operate to generate the necessary V-cipher key.
  • the V-cipher key generated from the UCI by the M-cipher key and the M-algorithm is ⁇ common to all users and is specific to a predetermined pay time period.
  • a subscriber is issued with a data card once a year to give him blanket access to all channels b * _. roadcast in V-cipher form. This would replicate the present contractual position with regard to the BBC annual licence fee *
  • the invention is however adaptable to numerous other possibilities at various levels of selective viewing. For example broadcast programmes can be categorised as sport, news, entertainment, features etc., . and the pay period can be 3 months, 6 months etc., and can be specific to one or more selected broadcast channels. At its most flexible a particular UCI message could cover simply a single programme for which there is high demand such as a World Cup football final.
  • a UCI message in plaintext i.e before M- ciphering
  • the portion 329 is a broadcasting station identifier
  • the portion 46 is a time period identifier
  • the portion 6219 is the V-cipher decipheiing key applicable to V-ciphered broadcasts to take place in the identified time period 46.
  • This example requires the station identifier and the time period to be broadcast together with the ciphered broadcast video signal.
  • the broadcast video signal including the station identifier and the time period is common to all subscribers, and no individualised signals are broadcast.
  • the control unit locally generates the necessary V- cipher key and extracts the station identifier and the time period from the UCI, and then stores these items in memory within memory means 15 for on-line use.
  • the signal captured by his local antenna 12 is supplied through input 11 to a video processor 20.
  • the processor 20 deciphers the ciphered video signal on-line using the V-cipher key and in accordance with the V-deciphering algorithm also stored in memory 15 and supplied to and from the processor 20 through latches 21 and 22.
  • the deciphered plain video signal is fed out from output terminal 13.
  • the processor 20 is enabled to operate only if the station identifier and the time period broadcast with the video signal coincide with the station identifier and time period extracted from the UCI message and currently stored for comparison in memory 15.
  • Figure 2 shows a flow chart which summarises a method according to the invention using relatively short number sequences as examples.
  • the numerals 3214, 5587 and 9016 in Figure 2 are the unique UCI's sent to each subscriber.
  • control centre 25 selects 7093 as the V-cipher key which will be employed in the next broadcasting time period ( see
  • the centre 25 uses the M-ciphering algorithm on 7093 successively in combination with each unique M-cipher key to create the unique UCI messages for each subscriber ( see 25.2 ) .
  • subscribers 1, 2 and 3 have been allotted M-cipher keys 9618; 2903; and
  • the UCI messages for subscribers 1, 2 and 3 might then be 3214; 5587; and 9016, as shown in Figure 2.
  • the station identifier and the time period identifier ana any other relevant information are added to the UCI messages which are then mailed or otherwise transmitted to the individual subscribers.
  • Subscriber number 1 inputs UCI message 3214 and his controi unit uses its unique local M-cipher key 9618 to decipher 3214 to constitute the original V-cipher key 7093 (see 26.2).
  • control unit of subscriber number 2 uses its unique M-cipher key 2903 to decipher 5587 to constitute the same original V-cipher key 7093 ( see 27.2), and the control unit of subscriber number 3 uses its unique M-cipher key 7854 to decipher 9016 to constitute the same original V-cipher key 7093 ⁇ see 28.2).
  • V-cipher key 7093 generated in each subscriber's control unit can then decipher a programme broadcast in V-enciphered form ( see 24.1 ) in the relevant time period as described above ( see 26.3, 27.3 and 2S.3 respectively).

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

L'appareil et procédé pour contrôler l'accès à des signaux radiodiffusés est caractérisé par le procédé suivant : délivrance à chaque utilisateur potentiel d'une première clé sensiblement unique; délivrance à chaque utilisateur autorisé à utiliser le système d'un message codé à l'aide de la clé unique délivré audit utilisateur pour permettre, à l'aide de la première clé, un décodage local du message codé, afin de constituer une deuxième clé; et diffusion d'un signal encodé à l'aide de ladite deuxième clé pour permettre le décodage local du signal codé à l'aide de la deuxième clé. L'invention concerne également un appareil de contrôle de réception de télévision destiné à être utilisé avec le procédé décrit ci-dessus.The apparatus and method for controlling access to broadcast signals is characterized by the following method: providing each potential user with a first substantially unique key; delivery to each user authorized to use the system of a coded message using the unique key delivered to said user to allow, using the first key, a local decoding of the coded message, in order to constitute a second key ; and broadcasting a signal encoded using said second key to allow local decoding of the signal encoded using the second key. The invention also relates to a television reception control apparatus for use with the method described above.

Description

APPARATUS AND METHOD FOR CCWTROLLT G ACCESS TO BROADCAST
SIGNALS
Field of the Invention
This invention relates to the control of access to broadcast signals, particularly, but not exclusively, video services such as television programmes and broadcast data services such as financial and medical information services. Such access control and regulation is of use in ensuring payment for selected broadcast services by subscribing users.
Background to the Invention
The control of access presents two problems. The first problem is to provide a method of distorting, scrambling or otherwise enciphering the broadest signal so that it becomes substantially meaningless to a non- subscribing viewer, and at the same time the method should be strong in terms of irreversibility so that it becomes very difficult or uneconomic to manufacture unauthorised or pirate devices for recreating the plain signal. A number of suitable ciphers are known to those skilled in the communication arts. The cipher should preferably be a key symmetric cipher.
The second problem is to provide a method and apparatus for ensuring that the user cannot continue to gain access after his subscription expires or his contract with the broadcasting agency ceases to be in force. This problem is more difficult because the user has already been provided with a control device or decoder for use during his subscription period and may decline to return his decoder, necessitating expensive legal proceedings. Even if the cipher is changed at the end of each subscription period, the decoder itself constitutes a structure for reverse engineering by a potential manufacturer of pirate devices who will assume that the cipher changes will be trivial. The problem is to provide such a control device which will for all practical purposes be useless after expiry of a subscription but which can be rendered operative again should the subscription subsequently be renewed.
An object of the present invention is to provide a method and apparatus which allows solution of this technical problem.
Summary of the Invention
According to the present invention in one aspect there is provided a method of controlling access to a broadcast signal characterised by the method comprising:
issuing a first substantially unique key to each intending user;
issuing to each user to be allowed access a message enciphered by use of the key unique to that user so as to permit local deciphering of the ciphered message by use of the issued first key to constitute a second key; and
broadcasting a signal enciphered by use of said second key so as to permit local deciphering of the ciphered signal by use of the second key.
In another aspect the invention provides a method of gaining local access to a broadcast signal characterised by the method comprising:
locally storing a first substantially unique key; locally storing first and second deciphering algorithms;
locally entering a ciphered mes'sage which has been ciphered at another location by use of said first key;
deciphering said ciphered message by use of said local first key and the first algorithm to constitute a second key; and
receiving and deciphering a ciphered broadcast signal by use of said second key and the second algorithm, said broadcast signal having been ciphered at another location by use of a second key.
In a further aspect the invention provides television receiver control apparatus characterised in that the apparatus comprises:
memory means for storing a first substantially unique key;
first means for storing a first deciphering algorithm;
second means for storing a second deciphering algorithm;
data entry means for entry of a ciphered message by a user seeking access to a broadcast video signal;
first deciphering means activated by said first key to decipher said ciphered message by use of said first deciphering algorithm whereby the deciphered message constitutes a second key; and
second deciphering means activated by said second key to decipher a received ciphered broadcast video signal by use of said second deciphering algorithm.
The present invention also includes within its scope a method of controlling access to a broadcast signal, and independently a method of gaining local access to a broadcast signal, substantially as described herein with reference to, and as illustrated in, the accompanying drawings. Furthermore, the invention includes within its scope television receiver control apparatus substantially as described herein with reference to, and as illustrated in, the accompanying drawings.
An embodiment of the invention will now be described, by way of example, with reference to the accompanying drawings; in which:
Brief Description of th * rawings
Figure 1 is a block circuit diagram of an access control unit according to the invention, for use with a subscriber's television receiver; and
Figure 2 is a flow chart of operation of a control method according to the invention.
Description of the Preferred Embodiment
Figure 1 shows a control unit 10 for use with a television receiver 23 to control access to a video signal which is broadcast in ciphered form. The control unit has an input 11 connected to the local TV antenna 12, and an output 13 connected to the television receiver antenna input socket 14. The control unit is adapted to decipher a ciphered video signal received at its input 11 and to provide a deciphered plain video signal at its output 13.
The control unit 10 contains memory means 15 which includes a memory for storing a first key termed the Message or M-cipher key, and memories for storing first and second deciphering algorithms referred to as the M and V deciphering algorithms respectively. The memory is suitably an integrated circuit chip. Before delivery to the user the memory chip is primed with the M and V deciphering algorithms and with a substantially unique M- -5-
cipher key. The M-cipher key is suitably in the form of a serial number in the range of from 1 to 1,000,000,000,000 whereby the system can create up to a million million different ciphertext messages from a single plain text message and can thereby accommodate a million million subscribers.
The M-cipher is a key symmetric message cipher, i.e a cipher which, in response to activation by a key, converts an intelligible stream of letters and numbers, i.e the message, into an unintelligible stream, at d which also operates in reverse to convert the unintelligible stream back to the intelligible stream upon activation by an identical key.
The V-cipher is a key symmetric video cipher which applies the same properties of key activation and reversibility to a video signal. The broadcast video signal is ciphered by use of the V- cipher key before transmission. The ciphered broadcast video signal is thus common to all subscribers and there is no requirement to broadcast individualised coded video signals.
Upon payment or renewal of his subscription a user in possession of a primed control unit receives a ciphered message to allow him to enable the control unit. The ciphered message is referred to as
Unique Customer Information or UCI. Each message is in numerical form and consists of M-cipher ciphertext of the V-cipher key for the next broadcasting period from the pertinent broadcasting organisation. Each UCI is substantially unique because it has been created by using the M-cipher key specific to each subscriber.
The control unit 10 is provided with data entry means 16 connected to a data input circuit 17 so that the user can enter his UCI message. The data entry means can be a numerical keyboard or keypad, an alphanumeric keyboard, a slot to accept a coded card, a modem connected to a public telephone line or any other convenient arrangement. The UCI message can be represented in print and sent to the subscriber by mail who then enters the number on the keyboard. The UCI message can alternatively be embodied in a punched card, a magnetic strip card, a dumb memory card containing memory but no processor, or a smart memory card containing both a memory and a processor. These cards can be sent by mail to the user who then inserts the card in the slot in the control unit and the UCI message is transferred by means appropriate to the type of card, as known to those in the art.
When the UCI message is embodied in print or on a card it can be sent by mail or the subscriber can apply to a vending station. An alternative arrangement which offers greater flexibility is for the control unit to receive the UCI message through a modem or other device coupled to a public telephone line, in response to a telephoned request by the subscriber. This would allow an accounting and management system to be automatically linked to the existing telephone account billing system, and will also permit great flexibility in the terms and periods for each UCI message.
When the UCI message is entered into the control unit it is deciphered by use of the unique M-cipher key stored in the local memory 15 in accordance with the M-deciphering algorithm also stored in the local memory 15, whereby to constitute the V-cipher key. The deciphering is effected by a processor 18 connected through a latch 19 to the data input circuit 17. Because the UCI message is unique to that subscriber he cannot make use of any UCI message supplied to any other subscriber and nor can the other subscriber make use of the first subscriber's UCI message. If any such inappropriate UCI message is entered into a control unit it cannot operate to generate the necessary V-cipher key. If the subscriber ceases payment and the subscription period expires, his previous UCI message and the control unit become useless since a fresh UCI message is then necessary for the next period. The V-cipher key generated from the UCI by the M-cipher key and the M-algorithm is ^common to all users and is specific to a predetermined pay time period. In a very simple arrangement, a subscriber is issued with a data card once a year to give him blanket access to all channels b *_. roadcast in V-cipher form. This would replicate the present contractual position with regard to the BBC annual licence fee* The invention is however adaptable to numerous other possibilities at various levels of selective viewing. For example broadcast programmes can be categorised as sport, news, entertainment, features etc., . and the pay period can be 3 months, 6 months etc., and can be specific to one or more selected broadcast channels. At its most flexible a particular UCI message could cover simply a single programme for which there is high demand such as a World Cup football final.
By way of example a UCI message in plaintext, i.e before M- ciphering, might be the number sequence 329466219. The portion 329 is a broadcasting station identifier, the portion 46 is a time period identifier, and the portion 6219 is the V-cipher decipheiing key applicable to V-ciphered broadcasts to take place in the identified time period 46. This example requires the station identifier and the time period to be broadcast together with the ciphered broadcast video signal. This can be accomplished by any of the various methods "known to those in the art, for example within the videotext lines, in the lines at the extremities of the active picture area, in digital form within the line or frame synchronisation signals, or modulated on to a sub-carrier transmitted together with the video signal. The broadcast video signal including the station identifier and the time period is common to all subscribers, and no individualised signals are broadcast.
In operation the control unit locally generates the necessary V- cipher key and extracts the station identifier and the time period from the UCI, and then stores these items in memory within memory means 15 for on-line use. When the user wishes to view a programme broadcast in V-cipher form, the signal captured by his local antenna 12 is supplied through input 11 to a video processor 20. The processor 20 deciphers the ciphered video signal on-line using the V-cipher key and in accordance with the V-deciphering algorithm also stored in memory 15 and supplied to and from the processor 20 through latches 21 and 22. The deciphered plain video signal is fed out from output terminal 13. The processor 20 is enabled to operate only if the station identifier and the time period broadcast with the video signal coincide with the station identifier and time period extracted from the UCI message and currently stored for comparison in memory 15.
Figure 2 shows a flow chart which summarises a method according to the invention using relatively short number sequences as examples.
Figure 2 may be understood using the identification table that follows:
TΩ KTTFTCATTO ABLE
24 Broadcasting station
24.1 Transmits programme enciphered with V-key = 7093
25 Control centre
25.1 Inputs V = 7093 into M-cipher
25.2 Creates unique UCI messages as M-cipher text of 7093 using M-keys 9618; 2903; 7854
25.3 Unique UCI is sent to each subscriber
26 Subscriber 1 26.1 M-cipher key = 9618
26.2 M-cipher deciphers 3214; V-key = 7093
26.3 V-cipher deciphers broadcast
27 Subscriber 2
27.1 M-cipher key = 2903
27.2 M-cipher deciphers 5587; V-key = 7093
27.3 V-cipher deciphers broadcast
28 Subscriber 3
28.1 M-cipher key = 7854
28.2 M-cipher deciphers 9016; V-key = 7093
28.3 V-cipher deciphers broadcast
The numerals 3214, 5587 and 9016 in Figure 2 are the unique UCI's sent to each subscriber.
Briefly the control centre 25 selects 7093 as the V-cipher key which will be employed in the next broadcasting time period ( see
25.1 ). The centre 25 then uses the M-ciphering algorithm on 7093 successively in combination with each unique M-cipher key to create the unique UCI messages for each subscriber ( see 25.2 ). For example, subscribers 1, 2 and 3 (see 26, 27 and 28 respectively) have been allotted M-cipher keys 9618; 2903; and
7854 { see 26.1, 27.1 and 28.1 respectively), and have control units 10 ( see Figure 1 ) respectively primed with these keys. The UCI messages for subscribers 1, 2 and 3 might then be 3214; 5587; and 9016, as shown in Figure 2. The station identifier and the time period identifier ana any other relevant information are added to the UCI messages which are then mailed or otherwise transmitted to the individual subscribers. Subscriber number 1 inputs UCI message 3214 and his controi unit uses its unique local M-cipher key 9618 to decipher 3214 to constitute the original V-cipher key 7093 (see 26.2). Similarly the control unit of subscriber number 2 uses its unique M-cipher key 2903 to decipher 5587 to constitute the same original V-cipher key 7093 ( see 27.2), and the control unit of subscriber number 3 uses its unique M-cipher key 7854 to decipher 9016 to constitute the same original V-cipher key 7093 { see 28.2).
It will be appreciated that no M-cipher key information is transmitted with the UCI messages and that the M-cipner keys of two subscribers bear no relationship to one another. The common V-cipher key 7093 generated in each subscriber's control unit can then decipher a programme broadcast in V-enciphered form ( see 24.1 ) in the relevant time period as described above ( see 26.3, 27.3 and 2S.3 respectively).
It will also be appreciated by those skilled in the art that, although the invention has been particularly described m relation to video or television signal scrambling, it is also applicable to the encryption of other forms of broadcast service.

Claims

-11-CT-ATMS:
1. A method of controlling access to a broadcast signal characterised by the method comprising:
issuing a first substantially unique key to each intending user;
issuing to each user to be allowed access a message enciphered by use of the key unique to that user so as to permit local deciphering of the ciphered message by use of the issued first key to constitute a second key; and
broadcasting a signal enciphered by use of said second key so as to permit local deciphering of the ciphered signal by use of the second key.
2. A method of controlling access to a broadcast signal according to Claim 1 characterised in that the ciphered message is embodied in a punched card, a magnetic strip card, a dumb memory card or a smart memory card.
3. A method of gaining local access to a broadcast signal characterised by the method comprising:
locally storing a first substantially unique key;
locally storing first and second deciphering algorithms;
locally entering a ciphered message which has been cipnered at another location by use of said first key;
deciphering said ciphered message by use of said local first key and the first algorithm to constitute a second key; and receiving and deciphering a ciphered broadcast signal by use of said second key and the second algorithm, said broadcast signal having been ciphered at another location by use of a second key.
4. A method of gaining local access to a broadcast signal according to Claim 3 characterised in that the ciphered message is embodied in a punched card, a magnetic strip card, a dumb memory card or a smart memory card.
5. Television receivei* control apparatus characterised in that the apparatus comprises:
memory means for storing a first substantially unique key;
first means for storing a first deciphering algorithm;
second means for storing a second deciphering algorithm;
data entry means for entry of a ciphered message by a user seeking access to a broadcast video signal;
first deciphering means activated by said first key to decipher said ciphered message by use of said first deciphering algorithm whereby the deciphered message constitutes a second key; and
second deciphering means activated by said second key to decipher a received ciphered broadcast video signal by use of said second deciphering algorithm.
6. Television receiver control apparatus according to Claim 5 characterised in that the data entry means is a numerical keyboard or keypad, a slot to accept a coded card, or a modem connected to a telephone line.
EP19910903871 1990-02-14 1991-02-14 Apparatus and method for controlling access to broadcast signals Withdrawn EP0515448A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB909003325A GB9003325D0 (en) 1990-02-14 1990-02-14 Apparatus and method for controlling access to broadcast signals
GB9003325 1990-02-14

Publications (1)

Publication Number Publication Date
EP0515448A1 true EP0515448A1 (en) 1992-12-02

Family

ID=10670966

Family Applications (1)

Application Number Title Priority Date Filing Date
EP19910903871 Withdrawn EP0515448A1 (en) 1990-02-14 1991-02-14 Apparatus and method for controlling access to broadcast signals

Country Status (4)

Country Link
EP (1) EP0515448A1 (en)
AU (1) AU7236291A (en)
GB (2) GB9003325D0 (en)
WO (1) WO1991012693A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6636833B1 (en) 1998-03-25 2003-10-21 Obis Patents Ltd. Credit card system and method
US8036988B2 (en) 1999-01-15 2011-10-11 D Agostino John System and method for performing secure credit card transactions

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5835864A (en) * 1991-10-03 1998-11-10 Thomson Consumer Electronics S.A. Method and apparatus for customizing a device with a smart card
JPH07283809A (en) * 1994-04-08 1995-10-27 Mitsubishi Corp Ciphering key system
US5719938A (en) * 1994-08-01 1998-02-17 Lucent Technologies Inc. Methods for providing secure access to shared information
US6324592B1 (en) 1997-02-25 2001-11-27 Keystone Aerospace Apparatus and method for a mobile computer architecture and input/output management system
KR20010110740A (en) 1999-04-13 2001-12-13 추후제출 Person-to-person, person-to-business, business-to-person, and business-to-business finalcial transaction system
US6804357B1 (en) * 2000-04-28 2004-10-12 Nokia Corporation Method and system for providing secure subscriber content data
US10592901B2 (en) 2001-06-04 2020-03-17 Orbis Patents, Ltd. Business-to-business commerce using financial transaction numbers

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2132860B (en) * 1982-12-21 1987-03-18 British Broadcasting Corp Conditional -access broadcast transmission
US4613901A (en) * 1983-05-27 1986-09-23 M/A-Com Linkabit, Inc. Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals
US4634808A (en) * 1984-03-15 1987-01-06 M/A-Com Government Systems, Inc. Descrambler subscriber key production system utilizing key seeds stored in descrambler
US4696034A (en) * 1984-10-12 1987-09-22 Signal Security Technologies High security pay television system
CA1244090A (en) * 1984-10-26 1988-11-01 General Instrument Corporation Cryptographic system for direct broadcast satellite network
GB8509390D0 (en) * 1985-04-12 1985-05-15 Paytel Ltd Video transmission system
ZA862839B (en) * 1985-05-24 1986-12-30 Scientific Atlanta Method and apparatus for scrambling and descrambling television signals
GB2214677B (en) * 1988-01-26 1991-06-26 Philips Electronic Associated Decoding transmitted scrambled signals
US4864615A (en) * 1988-05-27 1989-09-05 General Instrument Corporation Reproduction of secure keys by using distributed key generation data
FR2641152B1 (en) * 1988-12-23 1996-05-10 Europ Rech Electr Lab

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9112693A1 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6636833B1 (en) 1998-03-25 2003-10-21 Obis Patents Ltd. Credit card system and method
US7571142B1 (en) 1998-03-25 2009-08-04 Orbis Patents Limited Credit card system and method
US7593896B1 (en) 1998-03-25 2009-09-22 Orbis Patents Ltd. Credit card system and method
US8036988B2 (en) 1999-01-15 2011-10-11 D Agostino John System and method for performing secure credit card transactions

Also Published As

Publication number Publication date
AU7236291A (en) 1991-09-03
GB2241096A (en) 1991-08-21
GB9103138D0 (en) 1991-04-03
GB2241096B (en) 1994-03-23
GB9003325D0 (en) 1990-04-11
WO1991012693A1 (en) 1991-08-22

Similar Documents

Publication Publication Date Title
US4739510A (en) Direct broadcast satellite signal transmission system
US6005938A (en) Preventing replay attacks on digital information distributed by network service providers
US6587561B1 (en) Key delivery in a secure broadcasting system
CA1277764C (en) System for enabling descrambling on a selective- subscription basis in a subscriber communication network
Tu et al. On key distribution management for conditional access system on pay-TV system
RU2196389C2 (en) Broadcasting and receiving system and associated conditional access system
CA2199526C (en) Conditional access system
TW554627B (en) Method for operating a conditional access system for broadcast applications
US5675647A (en) Cable TV system using passwords
US4685131A (en) Program blocking method for use in direct broadcast satellite system
US7043020B2 (en) Smartcard for use with a receiver of encrypted broadcast signals, and receiver
RU2547446C2 (en) Method of access to services provided by subscriber module
US20050089168A1 (en) Method and system for conditional access
EP0148235A1 (en) Encrypted broadcast television system.
CN100442839C (en) Information transmitting method and apparatus for interactive digital broadcast television system
MXPA04002726A (en) Ca system for broadcast dtv using multiple keys for different service providers and service areas.
EP0515448A1 (en) Apparatus and method for controlling access to broadcast signals
FR2779599A1 (en) System for television broadcasting to multiple users with right of access
CN100551034C (en) A kind of mobile multi-media service implementation method and condition receiving system
MXPA05006345A (en) Method for access control in digital pay television.
RU2329612C2 (en) Conditional access data decryption system
JPH10117173A (en) Information distributer and information receiver
CA2467983A1 (en) Method for controlling access to specific services from a broadcaster
AU2004209188B2 (en) Method for storing and transmitting data generated by a security module
JPH0818525A (en) Information transmission system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19920908

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IT LI LU NL SE

17Q First examination report despatched

Effective date: 19940720

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 19950131