EP0750813A4 - Einrichtung zur datenentschlüsselung in einem empfangssystem für abonnementsfernsehsignale - Google Patents

Einrichtung zur datenentschlüsselung in einem empfangssystem für abonnementsfernsehsignale

Info

Publication number
EP0750813A4
EP0750813A4 EP94912807A EP94912807A EP0750813A4 EP 0750813 A4 EP0750813 A4 EP 0750813A4 EP 94912807 A EP94912807 A EP 94912807A EP 94912807 A EP94912807 A EP 94912807A EP 0750813 A4 EP0750813 A4 EP 0750813A4
Authority
EP
European Patent Office
Prior art keywords
output
input
decryption
bit
bits
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP94912807A
Other languages
English (en)
French (fr)
Other versions
EP0750813A1 (de
Inventor
Peter Michael Murphy
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Technicolor USA Inc
Original Assignee
Thomson Consumer Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Consumer Electronics Inc filed Critical Thomson Consumer Electronics Inc
Publication of EP0750813A1 publication Critical patent/EP0750813A1/de
Publication of EP0750813A4 publication Critical patent/EP0750813A4/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/125Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/601Broadcast encryption

Definitions

  • This invention is related to the Held of digital video signal processing, and more particularly to apparatus for decrypting a television signal received from a transmission channel such as a broadcast satellite, for example.
  • Subscriber video and television services such as cable and satellite broadcast/receiving systems, often encrypt various broadcast services, such as video and audio, by means of a control word or "key" to limit access to only paid subscribers.
  • the encrypting process at a transmitter may be in accordance with various techniques. Some of these techniques are described in "American National Standard Data Encryption Algorithm” ANSI X3.92- 1981, and in “American National Standard for Information Systems-Data Encryption Algorithm-Modes of Operation” ANSI X3.106-1983.
  • a bit selection processor associated with a decipher function of a receiver decryption processor exhibits enhanced operating speed by employing a combinational logic network rather than Look Up Tables, for example.
  • FIG. 1 is a block diagram of decrypting apparatus according to the principles of the present invention.
  • Figure 2 is a block diagram of a satellite video signal broadcasting and receiving system including the decrypting apparatus of Figure 1 in a transport unit of Figure 2.
  • Figures 3-13 depict block diagrams and tables which are helpful in understanding the decrypting operation of the apparatus shown in Figure 1.
  • Figures 14 and 15 respectively show a state diagram and an associated logic table for an input main state machine in the system of Figure 1.
  • Figures 16 and 17 respectively show a state diagram and an associated logic table for an output state machine in the system of Figure 1.
  • the decryption apparatus shown in Figure 1 operates in accordance with the Data Encryption/Decryption Algorithm (DEA), which is a standard algorithm for encrypting and decrypting digital data as discussed in "American National Standard Data Encryption Algorithm” ANSI X3.92- 1981.
  • DEA Data Encryption/Decryption Algorithm
  • the Figure 1 apparatus operates in an "electronic codebook mode" as described in "American National Standard for Information
  • each key is a 64 bit word comprising 56 decryption bits and 8 parity check bits. In the disclosed system, the 8 parity bits are not used.
  • An input signal may comprise either encrypted ciphertext data, or unencrypted plaintext data.
  • plaintext is intelligible text or signals that have meaning and that can be read and used
  • decryption is the process of transforming ciphertext into plaintext by means of a standard algorithm.
  • the input signal is in the form of a parallel 8 byte datastream of 8 bits/byte.
  • An input 8 byte shift register 10 acquires input data one byte at a time in response to a clock.
  • the clock signals are not shown to simplify the drawing.
  • 8 bits (1 byte) are clocked into register 10 during each clock cycle, whereby 8 clock cycles are required to fully load register 10 with
  • Elements 12, 14, 16 and 18 form a decryption processor.
  • the loading of input register 10 is accomplished while the decryption processor is performing the data decryption algorithm on 64 bits of data from a previous input cycle. Since the standard data decryption algorithm (as will be discussed) is composed of 16 iterations, and 8 clock cycles are required to load register 10, the clocking speed of decryption processor elements 12, 14, 16 and 18 is twice as fast as that of input register 10, ie., twice as fast as the speed of acquiring the next 8 bytes of input data.
  • the decrypting operation is under the control of a state machine 20, eg., a microcontroller.
  • State machine 20 may be programmed to cause the system to wait between decrypting data while the rest of the next 64 bits of input data is acquired, or it may be programmed to cause the system to proceed directly to decrypting new data after completing the decryption of the previous data.
  • State machine 20 responds to input control signals Start and Bypass, and produces an output Control signal.
  • the Bypass signal signifies that the normal decryption operation is to be modified so that input unscrambled plaintext data remains in the same form at an output of the decryption network, ie., the decryption process is to be bypassed.
  • An output Control signal from state machine 20 conveys this bypass instruction to decryption processing elements 12 and 16, and to output state machine 22.
  • state machine 20 causes "I" register 12 to be loaded from input register 10, then register 12 waits ("idles") for an interval encompassing the 16 decryption iterations (as will be discussed in connection with Figure 3) without performing the iterations, after which the contents of register 12 are passed to output register 26. Since a final data permutation (inverse permutation) at the input of output register 26 is predetermined to be the inverse of the initial permutation at the input of register 12, the plaintext output data from register 26 is identical to the input plaintext data.
  • the decryption bypass function is advantageously accomplished without resorting to the circuit and interface complexities which would be associated with the use of switching networks for switching the plaintext data around the decryption processing network.
  • An input ciphertext/plaintext digital signal received and processed by the disclosed system is in the form of data packets including a data component which is subject to encryption, and an associated header component which contains data-identifying information.
  • the header is not encrypted.
  • the input Bypass control signal to unit 20 is produced in reponse to a control bit included in the header of a received data packet that is sensed by an input signal processing network (not shown).
  • the Control signal from unit 20 contains information that instructs register 12 to idle for sixteen iterations in the plaintext bypass mode, as noted above.
  • the Control signal from unit 20 also contains information that instructs a multiplexer in register 12 to select either the output of unit 10 or the output of unit 18 for processing.
  • the Start signal input to unit 20 is generated by an input signal processing network preceding unit 20 (not shown) that senses the header of a received 8 byte data packet and, after eight bytes are sensed (indicating that input register 10 is full), generates information on the Control signal line that causes the output of input register 10 to be loaded into register 12. This information also informs output state machine 22 that another block of data has entered the data processing pipeline, which data block will be output from shift register 26 under control of unit 22 after the sixteen-step iterative decryption process has been completed as will be discussed.
  • Figures 14 and 15 respectively show a state diagram and an associated logic table for state machine 20.
  • unit 20 When the Start signal is received, unit 20 first initializes the decryption system by loading 64 bit input data from unit 10 to unit 12. Unit 20 then counts the 16 iterations of the decryption, after which unit 20 waits for the next Start signal. In anticipation of the last Start signal still being present at the end of the decryption process, unit 20 goes to state "Done-Wait" and waits for the Start signal to disappear, after which unit 20 waits for the next Start signal.
  • the Start signal is received, unit 20 first initializes the decryption system by loading 64 bit input data from unit 10 to unit 12. Unit 20 then counts the 16 iterations of the decryption, after which unit 20 waits for the next Start signal. In anticipation of the last Start signal still being present at the end of the decryption process, unit 20 goes to state "Done-Wait" and waits for the Start signal to disappear, after which unit 20 waits for the next Start
  • Figures 16 and 17 respectively show a state diagram and an associated logic table for output state machine 22.
  • unit 22 receives a Done (Not done) control signal from state machine 20, that signal indicates that data is being decrypted or is being passed through the apparatus in the bypass mode. Unit 22 then advances to a Ready state.
  • state machine 20 signals that the decryption process is Done
  • output state machine 22 counts out the 8 bytes (states SI through S8). Unit 22 then waits for the Done then Done signal sequence. If a Done signal is received while the 8 bytes are being distributed, unit 22 keeps track of this by finishing the count with state RI through R8.
  • unit 22 goes to the Ready state and waits until the decryption process is completed. If a Done signal is received while states RI through R8 are being used, then at the end of the count state machine 22 goes directly to distributing the next 8 bytes.
  • the codeword permutations defined by the DEA standard are implemented by appropriately arranging the data bits on the data links interconnecting units 12, 14, 16 and 18 in Figure 1.
  • a decipher bit selection function performed by unit 18 is advantageously implemented by a combinational logic network.
  • the bit selection function may be implemented by means of a 6-input, 4-output combinational logic arrangement as will be explained subsequently.
  • the use of combinational logic for performing the bit selection function is considered to result in economy of hardware and faster operation of the selection function compared to the use of a ROM-based Look-Up table, for example.
  • Output state machine 22 allows the plaintext output to be conveyed to the output channel via register 26 one byte at a time while the next 64 bit sequence is being processed by units 12-18, and while another 64 bit sequence is being acquired by input register 10.
  • Output state machine 22 may be programmed to either wait after the last byte of a given sequence has been conveyed by output register 26 (since the next 64 bits may not have been completely decrypted), or state machine 22 may immediately begin distributing the next 64 bit plaintext output sequence.
  • state machine 22 and output register 26 may wait in the case of data occurring at a slow or non-uniform rate, or unit 22 may cause data blocks to be shifted out of register 26 as they appear in the case of data occurring at a maximum rate.
  • Output state machine 22 determines whether or not new data is being processed by the decryption network, if new data is being processed but is not completely decrypted, or if new data is decrypted and is waiting to be distributed to the output channel via register 26. This is determined in response to, for example, Control signal information from unit 20 indicating that a given block has been decrypted after sixteen iterations.
  • the input plaintext information is conveyed from input register 10 to output register 26 via decryption processor units 12 and 18, which exhibit modified operation in this mode. Specifically, the output of unit 18, corresponding to block 622 in Figure 6, is not used during the 16 iteration cycle over which decryption is otherwise performed.
  • the bypass mode is facilitated by causing register 12 to idle during the bypass mode, as follows.
  • the decryption processor and state machine 20 commence operation in substantially the same way as during a decryption operating mode. Data is transfered from shift register 10 to register 12 with a permutation of bit positions as described previously. In each of the 16 iterations of a decryption, the right half of register 12 gets the previous left half of register
  • Register 12 maintains its value until output register 26 is ready to accept data from register 12. Register 12 maintains its value by conveying output to input on each clock.
  • the data encryption/decryption algorithm is designed to encipher and decipher 64 bit data blocks, under control of a 64 bit key.
  • Deciphering uses the same key that was used for enciphering, but with the schedule of addressing the key bits altered so that the deciphering process is the reverse of the enciphering process.
  • a block to be enciphered is subjected to an initial permutation "IP", then to a complex key-dependent computation, and finally to a permutation IP- 1 that is the inverse of the initial permutation.
  • the key-dependent permutation may be defined in terms of a cipher function "f and a key schedule function "KS.” Descriptions of computation and enciphering operations are provided below. The following notation is convenient to an understanding of the following material. Given two blocks L and R of bits, LR denotes a block consisting of the bits of L followed by the bits of R. Since concatenation is associative, Bl, B2...B8, for example, denotes a block consisting of the bits of Bl followed by the bits of B2 ... followed by the bits of B8.
  • the enciphering computation is illustrated by Figure 3. The
  • 64 bits of an input block to be enciphered are first subjected to initial permutation IP, as given in table 1 of Figure 4, before being received by register 12 in Figure 1.
  • the permuted input has bit 58 of the input as its first bit, bit 50 as its second bit, and so on, with bit 7 as the last bit.
  • the permuted input block is then input to a complex, key-dependent computation described by the equations that follow below.
  • the output of that computation called the "preoutput”
  • the output of the algorithm has bit 40 of the preoutput block as its first bit, bit 8 as its second bit, and so on, until bit 25 of the preoutput block is the last bit of the output.
  • the initial permutation performed at the input of register 12 may be accomplished by rearranging the wiring that connects the output of unit 10 to the input of unit 12. Alternatively, this could be accomplished by using a logic network.
  • the inverse permutation performed at the input of output register 26 may be accomplished similarly.
  • R' L + f(R,K) (Equation 1) where in this example "+" denotes bit-by-bit modulo 2 addition.
  • the input of the first iteration of the calculation is the permuted input block. If L'R' is the output of the sixteenth iteration, then R'L' is the preoutput block.
  • a different block K of key bits is selected from the 64 bit key designated as KEY. This is accomplished by selectable 56 bit shift register 16 in response to the Control signal from unit 20.
  • shift register 16 shifts the 56 bits of the then active key one or two places for each iteration, as a function of a predetermined key schedule, and 48 bits are selected each time as indicated by function "K" at the output of shift register 16.
  • the 48 bits are selected by appropriately configuring the wiring bus between units 16 and 18.
  • An example of such a key schedule is described in "American National Standard Data Encryption Algorithm” ANSI X3.92- 1981 mentioned previously.
  • KS be a function that takes an integer "n” in the range from 1 to 16 and a 64 bit block KEY as input and yields as output a 48 bit block Kn, which is a permuted selection of bits from KEY.
  • Kn KS(n,KEY) (Equation 2)
  • Kn is determined by the bits in 48 distinct bit positions of KEY.
  • KS is called the key schedule because the block K used in the nth iteration of Equation 1 above is the block Kn determined by Equation 2.
  • the permuted input block be LR.
  • Lo and Ro be respectively L and R
  • Ln and Rn be respectively L' and R' of equation 1, when L and R are respectively Ln-i and Rn- l and K is Kn. That is, when n is in the range 1 to 16
  • Ln Rn-l
  • the preoutput block is then Ri6Li6.
  • the key schedule KS produces the 16 values of Kn that are required for the algorithm, as discussed in greater detail in the DEA publication "American National Standard Data Encryption Algorithm,” American National Standard X3.92-1981.
  • permutations performed at the transmitter/encryptor are the inverse of permutation performed at the receiver/decryptor.
  • initial permutation (IP) at the decryptor in Figure 1 has a corresponding inverse permutation performed at the encryptor.
  • the sixteen step iteration process involves the calculation of 16 key-dependent cipher functions f(R,K) performed by combinational logic bit selection network 18 in Figure 1. It should be understood that f(R,K) are actually decipher functions in the context of the decryption apparatus of Figure 1.
  • the decipher functions are the inverse of the cipher functions performed at the transmitter/encoder.
  • Figure 6 shows additional details of network 18. Referring to Figure 6, each calculation is performed with respect to a 32 bit block "R" designated as 610, and a 48 bit block "K" designated as 616. Block R is one-half of an input 64 bit data block, and K is a block of 48 bits chosen from a 64 bit key.
  • Block R is expanded to 48 bits (block 614) by function "E" performed by unit 612, to be compatible with the length of block K when blocks R and K are combined by unit 626.
  • a different block K of 48 key bits is chosen (permuted) from the (shifted) 64 bit key according to a predetermined schedule.
  • a combinational logic bit selection network 628 includes a plurality of unique selection functions SI, ... S8 which essentially form the basis of the cipher/decipher function.
  • Each selection function SI, ... S8 produces a unique combination of 4 output bits in response to 6 input bits received from an exclusive-OR logic network 626. That is, each of the selection functions substitutes one set of original bits for another set of bits.
  • the 6 bit to 4 bit substitution is in accordance with the DEA standard.
  • the original bits for which the substitution is made are either plaintext bits or encrypted bits, depending on whether the operation is being performed at a transmitter/encryptor or a receiver/decryptor.
  • block 610 represents an input data block to unit 12 of Figure 1
  • element E represents an expansion function performed within unit 12 in Figure 1.
  • Block 614 represents a 48 bit output block from unit 12 in Figure 1.
  • Block 616 represents an output data block from unit 16 of Figure
  • Network 626, processor 628 and a permutation function P indicated by element 620 are included within unit 18 in Figure 1, which produces an output 32 bit data block designated by 622 in Figure 6.
  • Elements 612, 614, 620 and 628 of Figure 6 perform the cipher function "f" shown in Figure 3.
  • the elements of Figure 6, particularly elements 612, 614, 626, 628 and 620, may be employed in both the encryption and decryption processes.
  • element E denotes an expansion function that receives an input block of 32 bits and produces an output block of
  • Function E is such that the 48 output bits, written as 8 blocks of six bits each, are obtained by selecting the input bits in the order indicated by table 3 in Figure 7.
  • the first three bits of E(R) are the bits in positions 32, 1, and 2 of R
  • the last two bits of E(R) are the bits in positions 32 and 1.
  • SI, S2, ...S8 receives a 6 bit input block and produces a 4 bit output block. This process is illustrated by table 4 of Figure 8, which contains values for function SI. If SI is the function defined by table 4, and B is a block of 6 bits, then S 1(B) is determined as follows. The first and last bits of B represent, in base 2 binary form, a number in the range 0 to 3.
  • Table 4 which defines selection function SI, may be used as shown, ie., as shown in the specification of the DEA standard noted above.
  • table 4 in Figure 8 was rearranged as shown in Figure 11 to facilitate the use of a combinational logic network rather than Look-Up tables.
  • the table was rearranged so that 6 bit input B represents (in base 2) a number in the range 0 to 63, without altering the order of the bits in B.
  • the "Output" represents the quantity S1(B) discussed above.
  • the permutation function P yields a 32 bit output block from a 32 bit input block by permuting the bits of the input block.
  • the permutation function is defined by table 5 in Figure 10.
  • the output P(L) for the function P defined by this table is obtained from the input L by taking the 16th bit of L as the first bit of P(L), the seventh bit of L as the second bit of P(L), and so on until the 25th bit of L is taken as the 32nd bit of P(L).
  • ... S8 are eight distinct selection functions
  • P is the permutation function function
  • E is the expansion function.
  • blocks Bl, ... B8 are defined as blocks of 6 bits each for which
  • K+E(R) is first divided into the eight blocks as indicated in Equation 6. Then each Bi is taken as an input to Si, and the 8 blocks S1(B1),S2(B2), ... S8(B8) of 4 bits each are consolidated into a single block of 32 bits that forms the input to P.
  • the output (shown in Equation 7) is then the output of the function f for inputs R and K.
  • a transmitter section processes signals from a source 30.
  • source 30 includes a plurality of audio and video sources, eg., including television signal sources which contain information in the form of transport packets including a payload data component and an associated header component which describes the contents of an associated data component.
  • the data packets from the respective sources are subjected to asynchronous time division multiplexing (ATDM) onto an output path before being processed by units 32 and 34.
  • ATDM asynchronous time division multiplexing
  • Signals from source 30 are encoded and compressed by a unit 32, which in this example includes MPEG coding apparatus.
  • MPEG is an international standard developed by the Moving Pictures Expert Group of the International Standards Organization for coded representation of moving pictures and associated audio stored on a digital storage medium.
  • Encoded signals from unit 32 are provided to a Quaternary Phase Shift Keyed (QPSK) modulator and FEC (Forward Error Corrector) 34, which encodes the signal with error correction data and QPSK modulates the encoded signal onto a carrier.
  • Unit 34 performs both convolutional and Reed Solomon (RS) coding.
  • Uplink unit 36 transmits the compressed and encoded signal to satellite 40, which broadcasts the signal to a selected geographic reception area.
  • satellite 40 operates in two modes, which trade off channel capacity and transmission power. In one mode, satellite 40 transmits 16 channels at 120 watts each, and in other mode transmits 8 channels at 240 watts each.
  • the signal from satellite 40 is received by an antenna (not shown) and is coupled to an input tuner circuit 44 of a receiver.
  • An output signal from tuner 44 is QPSK demodulated by unit 46, decoded by means of units 48, 50 and 52, and applied to a transport processor 56.
  • a QPSK demodulator suitable for use as unit 46 is commercially available from Hughes Network Systems of Germantown, MD (integrated circuit type No. 1016212), and from Comstream Corp., San Diego, California (No. CD 2000).
  • Transport processor 56 transports a decoded output signal from unit 52 to appropriate decoders within unit 62 depending upon the content of the signal from unit 52, eg., audio or video information.
  • Transport unit 56 receives corrected data packets from unit 52 and examines the header of each packet to determine its routing.
  • Transport unit 56 includes the decryption apparatus shown in Figure 1.
  • unencrypted plaintext information includes header data, decryption keys, listings of available program material for each of the several sources, audio and miscellaneous items.
  • a satellite system typically provides many more channels than broadcast or cable systems, with many more program listings which advantageously should not be decrypted.
  • Audio and video output signals from unit 62 are respectively applied to an audio processor 66, and to an NTSC television signal video encoder 64 which encodes the video signal to a format suitable for use by signal processing circuits in a standard NTSC consumer television receiver 68.
  • the audio signals from unit 66 are applied to an audio input of receiver 68.
  • a microcontroller 60 responds to an input User Control signal, eg., from a remote control device, and operates interactively with tuner 44, demodulator 46, decoder units 48 and 50, and transport processor 56, as described in detail in a copending PCT patent application (RCA 87,182) of John S. Stewart. Briefly, microcontroller 60 provides a Frequency control signal to tuner 44 in response to a user's channel selection, causing tuner 44 to tune to the appropriate channel. QPSK demodulator 46 synchronizes with the tuned channel, provides a demodulated signal to decoder 48, and also provides a Signal Quality control signal to microcontroller 60 indicative of the quality (eg., signal to noise ratio) of a received signal. Demodulator 46 also provides a Demodulator Lock control signal to microcontroller 60 indicating whether or not demodulator 46 is synchronized with the input signal.
  • an input User Control signal eg., from a remote control device, and operates interactively with tuner 44, demodulator 46,
  • Decoder 48 uses a Viterbi algorithm to decode and correct bit errors in the demodulated signal from unit 46. Decoder 48 includes internal networks, as known, to synchronize its operation to the incoming demodulated signal in order to effectively decode the demodulated signal. Decoder 48 operates at one of two error correction decoding rates, which correspond to error correction coding rates provided at the transmitter. When satellite 40 operates in a low power mode, the transmitted signal uses a rate 2/3 error correction code, for example. When satellite 40 operates in a high power mode, the transmitted signal uses a rate 6/7 error correction code.
  • a Code Rate control signal eg., a binary signal developed by a comparator network in microcontroller 60, signifies either that the code rate used by decoder 48 should remain unchanged, or should be switched to another programmed code rate.
  • the Code Rate control signal may instruct decoder 48 to change the code rate as a function of the Signal Quality signal which indicates a low quality received signal, or as a function of the Demodulator Lock signal which indicates that demodulator 46 is not locked to (synchronized with) the received signal, coupled with an Error signal from Reed-Solomon decoder 52 indicating the occurrence of a decoding error.
  • decoder 48 If decoder 48 is using an incorrect error correction code rate for a given input signal, it is unlikely that RS decoder 52 will provide a normal output. An Error signal from decoder 52 will be analysed with regard to the Signal Quality and Demodulator Lock signals from demodulator 46. If the latter two signals indicate that the input signal is of acceptable quality and that demodulator 46 is synchronized with the input signal, it is likely that a decoding error manifested by the Error signal is caused by the fact that decoder 48 is using a code rate different from that of the received signal, ie., the error correction code rate of the transmitted signal was changed at the transmitter.
  • the Error signal may be due to these factors (eg., caused by rain fade) rather than to an incorrect code rate being used by decoder 48.
  • Microprocessor 60 may then wait a predetermined time before examining the control signals again.
  • De-interleaver 50 restores the ordering of data signal packets to an original sequence, and forms Reed-Solomon blocks in accordance with known techniques.
  • de- interleaver 27 relies upon an 8 bit sync word inserted by the encoder at the beginning of each RS block, thereby providing RS block synchronization.
  • the de-interleaved signal is supplied to Reed-Solomon decoder 28.
EP94912807A 1994-03-18 1994-03-18 Einrichtung zur datenentschlüsselung in einem empfangssystem für abonnementsfernsehsignale Withdrawn EP0750813A4 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
PCT/US1994/002942 WO1995026086A1 (en) 1994-03-18 1994-03-18 Data decryption apparatus in a subscription television signal receiving system
BR9408552A BR9408552A (pt) 1994-03-18 1994-03-18 Aparelho para processamento de sinais digitais em um sistema de processamento de sinais digitais de vídeo incluindo sinais contendo informações criptografadas

Publications (2)

Publication Number Publication Date
EP0750813A1 EP0750813A1 (de) 1997-01-02
EP0750813A4 true EP0750813A4 (de) 1998-08-19

Family

ID=25664662

Family Applications (1)

Application Number Title Priority Date Filing Date
EP94912807A Withdrawn EP0750813A4 (de) 1994-03-18 1994-03-18 Einrichtung zur datenentschlüsselung in einem empfangssystem für abonnementsfernsehsignale

Country Status (5)

Country Link
EP (1) EP0750813A4 (de)
JP (1) JPH09510592A (de)
AU (1) AU6520694A (de)
BR (1) BR9408552A (de)
WO (1) WO1995026086A1 (de)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2812312B2 (ja) * 1996-01-12 1998-10-22 三菱電機株式会社 暗号化システム

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4172213A (en) * 1977-11-17 1979-10-23 Burroughs Corporation Byte stream selective encryption/decryption device
US4274085A (en) * 1979-06-28 1981-06-16 Motorola, Inc. Flexible mode DES system
USRE33189E (en) * 1981-11-19 1990-03-27 Communications Satellite Corporation Security system for SSTV encryption
US4484027A (en) * 1981-11-19 1984-11-20 Communications Satellite Corporation Security system for SSTV encryption
US4613901A (en) * 1983-05-27 1986-09-23 M/A-Com Linkabit, Inc. Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals
US4731843A (en) * 1985-12-30 1988-03-15 Paradyne Corporation Method and device of increasing the execution speed of cipher feedback mode of the DES by an arbitrary multiplier
JPH03214834A (ja) * 1990-01-19 1991-09-20 Canon Inc マルチメデイアネツトワークシステム
US5237610A (en) * 1990-02-01 1993-08-17 Scientific-Atlanta, Inc. Independent external security module for a digitally upgradeable television signal decoder
US5285497A (en) * 1993-04-01 1994-02-08 Scientific Atlanta Methods and apparatus for scrambling and unscrambling compressed data streams

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
No further relevant documents disclosed *
See also references of WO9526086A1 *

Also Published As

Publication number Publication date
BR9408552A (pt) 1997-08-19
WO1995026086A1 (en) 1995-09-28
JPH09510592A (ja) 1997-10-21
AU6520694A (en) 1995-10-09
EP0750813A1 (de) 1997-01-02

Similar Documents

Publication Publication Date Title
JP3655921B2 (ja) 伝送地点において複数のサービスを一意的に暗号化するための方法及び装置
US5285497A (en) Methods and apparatus for scrambling and unscrambling compressed data streams
US8054974B2 (en) Opportunistic use of null packets during encryption/decryption
JP3789469B2 (ja) データを一意的に端局暗号化するための方法及び装置
US7062048B2 (en) Apparatus and method for single encryption with multiple authorization of distributed content data
US20100284537A1 (en) Method for efficiently decoding a number of data channels
KR20050103928A (ko) 맵 데이터 송수신용 강건성 시스템
JPS61208941A (ja) 暗号装置
JPH11176091A (ja) ディジタル情報入出力装置、受信装置、記録装置、および再生装置
JP2007133400A (ja) データのユニットをスクランブル及びデスクランブルする方法
JPH0756831A (ja) 個人用プログラムの送受信方法
JPH05500298A (ja) 暗号化装置
JPH05115064A (ja) テレビ放送におけるデイジタルマルチサウンドの暗号化および暗号解読のための方法および装置
CN1524362A (zh) 加密帧的下一个包中的流加密信息冗余
US8144868B2 (en) Encryption/decryption of program data but not PSI data
WO1995026107A1 (en) Data decryption apparatus in a subscription television signal receiving system
EP0750813A4 (de) Einrichtung zur datenentschlüsselung in einem empfangssystem für abonnementsfernsehsignale
CN113055716A (zh) 视频流实时加密方法及系统
CN108124182B (zh) 一种多路解复用方法及装置
US7583800B2 (en) Encryption apparatus and method in a wireless communications system
KR0176080B1 (ko) 디지털 방송을 위한 가입자 제한 수신용 데이타 암호화 방법
JP2542584B2 (ja) 加入放送システム
JPH08202262A (ja) 信号処理装置および信号処理方法
JP2022088740A (ja) スクランブル装置およびスクランブル方法
CA2168748C (en) Method and apparatus for uniquely encrypting a plurality of services at a transmission site

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19960909

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): DE FR GB

RHK1 Main classification (correction)

Ipc: H04N 7/167

A4 Supplementary search report drawn up and despatched

Effective date: 19980629

AK Designated contracting states

Kind code of ref document: A4

Designated state(s): DE FR GB

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 19991001