EP1300017A1 - Time stamping and time stamp validity verification system, method and device in a digital broadcasting environment - Google Patents
Time stamping and time stamp validity verification system, method and device in a digital broadcasting environmentInfo
- Publication number
- EP1300017A1 EP1300017A1 EP01954094A EP01954094A EP1300017A1 EP 1300017 A1 EP1300017 A1 EP 1300017A1 EP 01954094 A EP01954094 A EP 01954094A EP 01954094 A EP01954094 A EP 01954094A EP 1300017 A1 EP1300017 A1 EP 1300017A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- services
- information
- sequence
- service
- timestamp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/637—Control signals issued by the client directed to the server or network components
- H04N21/6377—Control signals issued by the client directed to the server or network components directed to server
- H04N21/63775—Control signals issued by the client directed to the server or network components directed to server for uploading keys, e.g. for a client to communicate its public key to the server
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/29—Arrangements for monitoring broadcast services or broadcast-related services
- H04H60/33—Arrangements for monitoring the users' behaviour or opinions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/236—Assembling of a multiplex stream, e.g. transport stream, by combining a video stream with other content or additional data, e.g. inserting a URL [Uniform Resource Locator] into a video stream, multiplexing software data into a video stream; Remultiplexing of multiplex streams; Insertion of stuffing bits into the multiplex stream, e.g. to obtain a constant bit-rate; Assembling of a packetised elementary stream
- H04N21/2365—Multiplexing of several video streams
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/4302—Content synchronisation processes, e.g. decoder synchronisation
- H04N21/4305—Synchronising client clock from received content stream, e.g. locking decoder clock with encoder clock, extraction of the PCR packets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/434—Disassembling of a multiplex stream, e.g. demultiplexing audio and video streams, extraction of additional data from a video stream; Remultiplexing of multiplex streams; Extraction or processing of SI; Disassembling of packetised elementary stream
- H04N21/4347—Demultiplexing of several video streams
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/475—End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
- H04N21/4758—End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data for providing answers, e.g. voting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/85—Assembly of content; Generation of multimedia applications
- H04N21/854—Content authoring
- H04N21/8547—Content authoring involving timestamps for synchronizing content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/173—Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
- H04N7/17309—Transmission or handling of upstream communications
- H04N7/17318—Direct or substantially direct transmission and handling of requests
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/40—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterised by details of platform network
- A63F2300/409—Data transfer via television network
Definitions
- the present invention relates to the field of time stamping (in English "time stamping") in a digital television environment, data time stamping being the action of marking this data using information taking into account a specific time and / or date, called a time stamp. More specifically, the invention relates to the time stamping of data requiring high security against fraud, from data broadcast in particular in digital television services.
- a digital data stream such as for example a digital television service or a physical or logical digital data transmission channel will hereinafter be called "service”.
- time stamping techniques are known in the state of the art.
- a time stamping system is known which is used in a digital television environment.
- This system is described in patent application WO 95.15653 from the inventors Lappington, Marshall, Yamamoto, Wilson, Berkobin and Simons, whose applicant is the company Zing Systems and which was published in June 1995.
- This document describes a system where two Datasets with a time stamp are sent separately to remote units including a data decoder, a remote control, and an operations center. Within each remote unit, the timestamps are compared to a remote clock and a difference in timestamp is noted for each of the two sets of data. The two differences are compared to determine if one of the sets has been delayed compared to the other. Only non-delayed sets can be validated.
- a disadvantage of this technique of the prior art is the lack of security that it provides. Indeed, we can detect several flaws linked to a lack of resistance to certain attacks in particular: the play of a prerecorded video stream, the theft of a set of data belonging to another person, using the same timestamp applied to separate data.
- an object of the invention is to provide a system, method and device for time stamping and / or checking the validity of a time stamp which provides high reliability and security in the time stamping of digital data to from data broadcast by digital television and / or radio services in particular.
- Security has two essential aspects: integrity and non-revocation. Integrity means that you cannot change the time stamp. Non-revocation implies that the issuer of time-stamped data cannot claim that the data was time-stamped at a time different from the time-stamp. For example, for a bet on a race, it is important to be sure that the bet was made before the start of the race.
- Timestamping is easy when the event to be timestamped takes place directly with a trusted authority. It is much more complex when it takes place in a remote manner; if it is necessary to use for example a telephone center to make a bet, the moment of reception of a call is not desirable to time stamp an event since there may exist a waiting time if necessary a girl; this reception time may be different from the actual bet time.
- An objective of the invention is to allow precise time stamping (for example to the nearest second).
- Another object of the invention is to allow a trusted authority to authenticate and validate this timestamp to, for example, allow the user to obtain bet wins or the trusted authority to determine the effective order of responses to a question.
- the invention proposes a method of time stamping digital data remarkable in that it comprises:
- an operation for defining a sequence of services comprising at least one service, each service being chosen from a list of services according to a method of choice giving a variable result for each occurrence of definition of a sequence of services; and an operation for collecting a sequence of timestamp information elements, according to which at least one information element is extracted from each service of the service sequence to form the elements of the sequence of elements of information, each piece of information comprising information representative of a current time stamp.
- the invention makes it possible to define a sequence of services which is not known in advance to a possible fraudster, a sequence which contains information representative of a time stamp which can subsequently be used for a time stamping of data, this sequence being difficult to reproduce, to predict or to falsify.
- a fraudster wants to thwart the system, he must record several flows and have the possibility of replaying them in a perfectly synchronized manner. If the number of flows is large enough, the cost of such fraud becomes prohibitive.
- the list of services can have any size including the size equal to one. In the latter case, the implementation of the invention is simplified (the choice being a trivial operation). However, to optimize the effectiveness of the invention, it is desirable to have at least two services. The number of services can be varied according to needs (desired level of security).
- the time stamping method is remarkable in that the method of choice giving a variable result is a method of random or pseudo-random drawing.
- the same approach can be applied for the number of services taken into account.
- a potential fraudster has no means of predicting the defined sequence of services.
- the time stamping method is remarkable in that it comprises a step of sending and / or receiving a message comprising the number of services in the sequence of services and the list of services.
- the time stamping method is remarkable in that it comprises an operation for constructing a time stamped data group comprising:
- - a group of information including: - digital data;
- the time stamping method is remarkable in that it further comprises an operation of collecting a sequence of information signatures, each of the signatures being associated in a one-to-one manner with each of the time stamp information and signing information comprising timestamp information and an identifier of the service from which it originates and the timestamping method also being remarkable in that the timestamped data group further comprises the sequence of information signatures.
- the invention advantageously offers an additional degree of security thanks to the signatures which prevent any alteration of the signed elements.
- the time stamping method is remarkable in that:
- each timestamp information also includes the definition of a recovery challenge to be extracted from the list of services
- the timestamping method further comprises an operation for extracting a response corresponding to the definition of each recovery challenge.
- the degree of security of the time stamping process is further increased, the means necessary to defraud being very heavy and of a prohibitive cost while the time stamping process itself remains relatively simple to implement.
- the time stamping method is remarkable in that the time stamped data group comprises in addition to the answer corresponding to the definition of each collection challenge.
- each timestamp information additionally comprises a fingerprint of the response.
- An information fingerprint is an extract or digest of information obtained by a hash technique.
- the invention advantageously lends itself to a verification of the timestamp not requiring a priori knowledge of the response to the collection challenge, but requiring the sole taking into account of one or more public keys which preferably will be used to verify the signature of the time stamp information and / or of the response fingerprint.
- the timestamping process notably makes it possible to send a summary of the responses to the collection challenge expected from a broadcaster at a collection center.
- This digest goes through a user terminal but the expected responses are not accessible by the user.
- the time stamping method remains simple to implement thanks in particular to the presence of fingerprints which make it possible to limit the memory size or the bandwidth necessary for the transmission of the expected responses.
- the time stamping method is remarkable in that it comprises an operation for transmitting the time stamped data group.
- the invention advantageously allows remote operation or verification of the data timestamp.
- the invention also proposes a method for verifying the validity of a timestamp of digital data, obtained according to a timestamping method as described above. According to a particular characteristic, this method is remarkable in that it performs a verification of at least one group of data capable of being time-stamped by a time-stamping method as previously described.
- the method for verifying the validity of a timestamp is remarkable in that it comprises at least one verification operation forming part of the group comprising:
- the method for verifying the validity of a timestamp is remarkable in that it comprises an operation for transmitting validated digital data.
- the verification method advantageously makes it possible to verify each of the points which guarantee the authenticity of a timestamp in a manner which can possibly be adapted to a desired degree of security.
- the verification process notably takes into account a summary of the responses to the expected recovery challenge which remains inaccessible to the user of the time stamping process.
- the verification process remains simple to implement thanks in particular to the presence of fingerprints which make it possible to limit the size of memory required (a trace of the information to be verified is not kept in memory).
- the invention also relates to a system comprising means for implementing:
- each of the services containing pieces of information representative of a time stamp
- the invention also proposes, for the same purposes as above, a device for time stamping digital data which is remarkable in that it comprises means suitable for setting up implementation of a time stamping process and / or verification of the validity of a time stamp according to one of the processes mentioned above.
- the invention proposes a device for time-stamping digital data which is remarkable in that it comprises: a means of defining a sequence of services comprising at least one service, each of the services being chosen within a list of services according to a method of choice giving a variable circulation for two uses of the means of defining a sequence of services; and - means for collecting a sequence of timestamp information elements extracting at least one information element from each of the services of the service sequence to form the elements of the sequence of information elements, each piece of information comprising information representative of a current time stamp.
- the invention proposes a device for verifying the validity of a timestamp of digital data remarkable in that it comprises at least one verification means forming part of the group comprising: - a signature verification means of a data group;
- FIG. 1 shows an infrastructure for broadcasting multimedia digital data with the use of a time stamp according to the invention according to a particular embodiment
- FIG. 2 illustrates a multimedia digital decoder present in the infrastructure of Figure 1 according to the invention according to a particular embodiment
- FIG. 3 describes a secure processor allowing a time stamp according to the invention according to a particular embodiment
- FIG. 4 describes a device for collecting responses and verifying timestamps having a modem for retrieving the responses according to the invention according to a particular embodiment
- FIG. 5 describes a device for collecting responses and verifying timestamps which, according to another preferred embodiment, has a secure processor reader, in accordance with the invention according to a particular embodiment;
- FIG. 6 describes an exchange protocol between a broadcaster, a central processor, a secure processor and a response collection device as described with reference to Figure 4 according to the invention according to a particular embodiment
- FIG. 7 describes an exchange protocol between a broadcaster, a central processor, a secure processor and a response collection device as described with reference to Figure 5 according to the invention according to a particular embodiment
- FIG. 8 describes a flowchart of operation of a central processor with time stamping method according to the invention according to a particular embodiment
- FIG. 9 describes an operating flow diagram of a secure processor with time stamping method according to the invention according to a particular embodiment.
- the general principle of the invention is mainly based on the use of a number N of digital streams to define a time stamp required by an application.
- N is typically of the order of a hundred and these streams are specific services (S1, S2, ... SN) of television and / or digital radio broadcast by a broadcaster.
- S1, S2, ... SN specific services
- Each of these services is called “time stamping service”.
- TSS Transmission Service
- the application defined by an interactive service provider can itself be transmitted from an application server to a broadcaster and then broadcast when it is used by an interactive television and received by a digital multimedia decoder (in English "set top box ”) at a user's home.
- the regular TSS services carry additional data, called “time stamping information” or TSI.
- Each of this TSI information includes the following information: - the current time stamp t;
- a means of preventing the alteration of the TSI information for example a signature of TSI based on a private key specific to the TSS service.
- the broadcaster provides a time stamping challenge (in English "Time Stamping Challenge") or TSC preferably coming from the application server which includes:
- N of TSS services - the number N of TSS services; - the list of all TSS services, that is to say an ordered list of N services which provide time information.
- the TSC timestamp challenge and the TSI information are received by a digital terminal which can be a multimedia digital decoder and which includes:
- the terminal uses a secure processor which randomly (or pseudo-randomly) defines a sequence (ie an ordered sequence) of service identifiers including SCH services taken from the N services in the list mentioned in the TSC challenge.
- the secure processor must then collect the successive timestamps present in the TSI information of each of the service SCHs defined by the ordered sequence.
- the set of services to be scanned being defined randomly by the secure processor, a fraudster who would like to reconstruct a time stamp should register all the TSS services and replay in deferred time all the TSS services broadcast, which is extremely cumbersome to implement and prohibitive cost.
- SCH preferably having a value between 1 and 10, the probability that a fraudster chooses the right service values is low and all the more low as SCH is large. If the need for security must be increased, a SCH value greater than 10 or even N may be taken.
- the SCH value is preferably defined by the application server requiring a time stamp as a function of the desired degree of security. The application server can change the SCH value often in order to increase security.
- recovery challenge in English “retrieval challenge”
- it is a challenge asking to extract, according to a preferred embodiment, a variable number of bytes in one or more of the components of at least one service considered and, according to another embodiment, in the set services.
- Typical challenges consist, for example, of finding the bytes numbered 12 to 35 in a video stream at the precise moment when the title of the event is broadcast.
- the secure processor must also collect the response corresponding to the definition of successive recovery challenges present in the TSI information of each of the SCH services defined by the ordered sequence.
- the secure processor gathers in a TSM timestamp message:
- the secure processor signs the set consisting of the data or data to be timestamped and the TSM message with its private key. Everything is sent to a response collection center (in English “Answer
- Collecting Center or ACC (or more generally a digital data collection center) via, for example, a telephone line coupled to a modem or a removable secure processor reader (a smart card for example).
- the response collection center is itself linked to an application server requiring a time stamp via, for example, a telephone line.
- the ACC center having in its possession the value (s) of SCH, the list of the public keys used for the verification of signatures and fingerprints used during a period of validity of the time-stamped data, performs a verification of the TSM message at several levels comprising:
- the ACC center does not need to know the correct answers to the challenges apart from the data provided by the TSM message.
- the ACC center After checking the time-stamped data, the ACC center can transmit the validated data and the corresponding time stamp to the application server.
- FIG. 1 an infrastructure for broadcasting digital multimedia data with the use of a time stamp is presented.
- This infrastructure includes:
- the application server 109 sends requests 110 for services requiring a response (or digital data) with time stamp to a broadcaster 100 and receives responses 111 with time stamp validated from the ACC center 108.
- Requests 110 for services also include challenges timestamp or TSC containing a SCH value which depends on the desired degree of security as well as a list of N services which can be used for timestamps.
- the application server 109 is for example a game or betting server.
- the broadcaster 100 is for example a broadcaster of digital television and / or radio services through a medium such as a cable or a satellite.
- a medium such as a cable or a satellite.
- it broadcasts timestamping challenges or TSC 101, which are preferably communicated to it by the application server 109, to the digital multimedia decoders 102, 103 and 104 after reception of a request 110 for services requiring a response with timestamp from the application server 109.
- the TSC challenges are produced by the diffuser 100.
- the user 112 (respectively 113 and 114) can send a response A 115 to his own multimedia digital decoder 102 (respectively 103, 104) (via for example a keyboard, a remote control, a voice recognition or recording unit or a touch screen) to a question from the application that he is viewing, for example on a television screen connected to his decoder 102 (respectively 103, 104).
- his own multimedia digital decoder 102 (respectively 103, 104) (via for example a keyboard, a remote control, a voice recognition or recording unit or a touch screen) to a question from the application that he is viewing, for example on a television screen connected to his decoder 102 (respectively 103, 104).
- Each of the S digital multimedia decoders 102, 103 and 104 receives timestamping challenges or TSC 101. Then when its user has provided an answer to a question from the application, a secure processor present in the decoder concerned 102, 103 or 104 respectively constructs a message comprising the response A (digital data) and a time stamping message, or time stamp, TSM which it transmits on a channel 105, 106 or 107 respectively of the telephone link type or a direct link by secure processor reader to an ACC 108 center. The ACC 108 center receives A response messages with their time stamps.
- the ACC center is also responsible for transmitting responses A with validated timestamps 111 to the application server 109.
- FIG. 2 schematically illustrates a multimedia digital decoder 200 such as one of the decoders 102, 103 or 104 present in the infrastructure of FIG. 1.
- the decoder 200 comprises interconnected by an address and data bus 203:
- tuner or tuner 201
- register designates in each of the memories mentioned, both a low-capacity memory area (some binary data) and a high-capacity memory area (allowing a program to be stored whole or an entire sequence of data).
- tuner 101 is suitable for extracting and formatting multimedia data corresponding to one or more television and / or radio services as well as data of the time stamping challenge or TSC 101 type originating from a channel 216.
- the video decoder 218 transforms the digital data received from the tuner 201 into analog data for television. This analog data is supplied on an output 219.
- the random access memory 205 stores data, variables and intermediate processing results, in memory registers bearing in the description, the same names as the data whose values they store.
- the RAM 205 includes in particular: - a TSC register 210 in which a received time stamp challenge is kept;
- the non-volatile memory 204 stores in registers which, for convenience, have the same names as the data they store, in particular the operating program of the processor 202 in a “Prog” register 209.
- the TSI extractor 206 is adapted to extract the timestamp information from a data stream supplied by the tuner 201.
- the extractor transmits the data extracted on the bus 203 to the processor 202.
- the modem 208 is suitable for transmitting responses with a time stamp to an ACC center via a telephone line. Other types of return path can of course be used.
- the man / machine interface 217 is adapted to take into account the responses given by the user through, for example, a keyboard, a remote control, a voice recognition or recording unit or a touch screen.
- FIG. 3 schematically illustrates a secure processor 207 as illustrated with reference to FIG. 2.
- the secure processor 207 comprises interconnected by an address and data bus 303:
- non-volatile memory 304 of flash EEPROM type
- Non-volatile memory 304 stores in registers which, for convenience, have the same names as the data they store, in particular: - the operating program of processor 302 in a “Prog” register 305;
- the RAM 311 stores data, variables and intermediate processing results, in memory registers bearing in the description, the same names as the data whose values they store.
- the RAM 311 includes in particular:
- a time stamp message in a “TSM” register 310 a time stamp message in a “TSM” register 310.
- the response A and the time stamp message TSM are not placed in the volatile memory 311 but in the rewritable non-volatile memory 304 when in particular the secure processor 207 is removable and when, in particular, the response A and the time stamp message TSM are intended to be transmitted directly from the secure processor to a collection center via the secure processor 207.
- FIG. 4 describes a device 400 for collecting ACC responses and verifying timestamps having a modem for retrieving the responses.
- the device 400 is like the ACC collection center 108 illustrated with reference to FIG. 1.
- the device 400 for collecting responses ACC comprises linked together by an address and data bus 403:
- processor 402 - a non-volatile memory 404;
- the modem 401 is able to receive and format messages with time stamps coming from a digital multimedia decoder in order to deliver them to the processor 402.
- the random access memory 405 stores data, variables and intermediate processing results, in memory registers bearing in the description, the same names as the data whose values they store.
- the random access memory 405 comprises in particular: - a TSM register 409 in which a message received with time stamp is kept;
- the public key of the secure processor KPubU could have been transmitted with the TSM message received or recorded beforehand by any means known to those skilled in the art.
- the public keys of the KPubTSSi time stamping services or the public key of the KPubD broadcaster are known to the ACC center by any means.
- a device for collecting responses and checking time stamps has a secure processor reader.
- the device of Figure 5 includes elements similar to those of Figure 4 previously described which have the same reference numbers and will not be described further. It is observed that a reader 501 of a removable secure processor replaces the modem 401. This reader 501 is capable of receiving and formatting messages with time stamp originating from a removable secure processor in order to deliver them to the processor 402.
- FIG. 6 which describes an exchange protocol between a diffuser 100, a central processor 202 of a digital decoder, a secure processor 207 and a device for collecting responses as illustrated with reference to FIGS. 1 to 4, further to a service request requiring a response with time stamp
- the broadcaster 100 carries out a broadcast 601 of TSC timestamp challenge to the central processor 202.
- the central processor 202 extracts from TSC the number of SCH challenges and the number of services N to be taken into account for a time stamp and performs a transmission 602 of SCH, N and 603 of a response A, given by the user through l interface 217, to secure processor 207.
- the secure processor determines a random sequence of time stamping CS, by performing a random or pseudo-random drawing of a sequence of SCH service identifiers CS [i], each value that can take a CS identifier ⁇ / between 1 and N, representing a service from the N services of the list mentioned in the TSC challenge, the indices / being between 1 and SCH included, and two service identifiers in the sequence CS can to be equal.
- a first time information request and response to a recovery challenge operation is carried out during which the secure processor sends a time stamp information request 604 corresponding to a first service "Ask (CS [1 ]) ”To the central processor 202.
- the latter after setting the tuner 201 to the CS channel [1], extracts the time stamp information from this first TSI service (CS [1]) as well as the response to a first RetC [1] recovery challenge defined by TSI (CS [1]) before transmitting, in step 606, the TSI information (CS [1]) and the RetC response [1] to the secure processor 207.
- this operation of time information request and response to a recovery challenge for each of the services CS [i] is repeated, with an integer / ranging from 2 to SCH.
- the secure processor signs the TSM message and response A with its private key KPriU 306 during a operation 610 and sends a signed TSM timestamp message 611 to the processor 202 which retransmits this message with the response A in a message 612 to the center> ACC 108.
- the ACC center validates the response during a step 613 and, where appropriate, transmits the validated response and timestamp to the application server.
- FIG. 7 which describes an exchange protocol between a broadcaster 100, a central processor 202 of digital decoder, a secure processor 207 removable and a response collection device as illustrated with reference to FIGS. 1, 2, 3 and 5, following a request for services requiring a response with time stamp, the broadcaster 100 performs a challenge challenge broadcast 601 TSC timestamp to central processor 202.
- the device of FIG. 7 comprises protocol elements similar to those of FIG. 6 previously described which bear the same reference numbers and will not be described further.
- the secure processor 207 retains in its non-volatile memory 304 the response A and the corresponding TSM message. The user can then remove the secure processor 207 from the multimedia digital decoder 200 to insert it into the reader 501 of an ACC center 500.
- the ACC 500 center then performs a reading 711 of the response A and the signed time stamp message TSM.
- the ACC center then validates the response A and if necessary sends the validated response with a time stamp to the application server.
- FIG. 8 which shows the operation of a central processor 202 with a time stamping method included in the electronic device illustrated in FIG. 2, it is observed that after an initialization operation 800 during which the registers of the RAM 205 are initialized, during a wait operation 801, the processor 202 waits to receive then receives a response A to time stamp.
- the processor 202 loads a TSC challenge from a broadcaster.
- the TSC challenge includes:
- the size of the SCH challenge ie the number of services to be taken into account in the challenge
- transport_streamJD transport_streamJD
- the broadcasting system preferably conforms to the DVB-SI standard of ETSI (European Telecommunications Standard Institute), "Specification for Service Information in Digital Video Broadcasting Systems" published under the reference ETS300468.
- ETSI European Telecommunications Standard Institute
- the networkJD triplet, transport_stream_ID, service D uniquely identifies a broadcast service.
- the processor 202 extracts from the challenge TSC, the size SCH of the challenge and the number N of services then sends SCH, N and the response A to the secure processor 207.
- the processor 202 initializes a counter “Compt” at 0. Then, during an operation 805, the counter “Compt” is incremented by one.
- the processor 202 waits for a challenge request CS [Compt] coming from the secure processor 207.
- the processor 202 extracts from the data received via the broadcasting channel the information TSI corresponding to the challenge CS [Account] denoted TSI (CS [Account]) and the response corresponding to the recovery challenge Ret C [Account] found in TSI (CS [ compt]) and then transmits them to the secure processor 207.
- the invention is compatible with the aforementioned DVB-SI standard which defines mandatory packets and private packets. Private packets can be configured as required and can therefore be used for time stamping services.
- Each TSS service has in its event information table, denoted EIT in the DVB-SI standard, a private data packet called time information packet, denoted TIP.
- the standard structure of this TIP packet includes only one identifier and a number of bytes, all other fields being defined by the user.
- the TIP packet is perfectly suited to the implementation of the invention and, according to the preferred embodiment, the TSI information (CS [count]) is transmitted in the form of a TIP packet which includes:
- TIP_header_tag an identifier specific to the type of TIP, TIP_header_tag
- a recovery challenge is completely defined by a CDef definition comprising the fields challengejtype, starting_byte and numbejbytes.
- the SIGN signature has two roles: it uniquely identifies the TSSi service with its private key and guarantees the integrity of the time information.
- the diffuser 100 can change the parameters of the challengejype, starting_byte and number_bytes challenge at any time.
- the public key KPubTSSi of the TSSi service is present in the ACC 108 center. Independent service providers can use the same timestamp information which is provided by the broadcaster 100.
- the processor 202 tests whether the value of the counter “Compt” is equal to the number SCH.
- increment operation 805 is repeated. If so, during an operation 809, the processor 202 waits for a time stamp message TSM coming from the processor 207. Then, when the TSM message is received, during an operation 810, the processor 202 transmits the response A with the TSM message to the center> ACC.
- operation 801 is repeated. It is noted that when the transmission of the response is done using a removable secure processor 207, operations 809 and 810 are not carried out and that one passes directly from test 808 with positive response to the reiteration of the 'operation 801.
- the processor 202 can place several responses A with time stamp in a queue for transmission before transmitting them in deferred time to a center 108 ACC.
- FIG. 9 which shows the operation of a secure processor 207 with a time stamping method included in the electronic device illustrated in FIG. 2 and illustrated in detail with reference to FIG. 3, it is observed that after an initialization operation 900 during which the registers of the RAM 305 are initialized, during a waiting operation 901 the processor 302 waits to receive then receives a response A to time stamp, the size SCH of the challenge and the number N of services to consider. Then, during an operation 902, the processor 302 randomly or pseudo-randomly selects a sequence of
- SCH numbers between 1 and N (each of these numbers being a pointer to a service in the ordered list of TSS services) representing a CS sequence of SCH challenges.
- the processor 302 initializes a counter “Compt” to zero.
- the secure processor 207 transmits to the central processor 202 the challenge of rank Compt, CSfCompt].
- the processor 302 waits for the information TSI (CS [Comp and for the definition of the corresponding recovery challenge during an operation 906. It then performs an operation of extraction of the response to the recovery challenge Then, during a test 907, the processor 302 checks whether the value of the counter “Compt” is equal to the number of SCH challenges. If not, the increment operation 904 is repeated. If so, during an operation 908, the processor 302 constructs a signed TSM message which includes the following data:
- - For each value from / ranging from 1 to SCH: - a service number which defines the TSS service used for the challenge / ' ; its value is the position of the TSS in the list provided by the TSC challenge; the first service in the list has the number 1;
- the totajsignature signature generation operation uses the private key
- FIG. 10 which shows the operation of a response collection device 108 ACC illustrated in FIG. 4 or in FIG. 5, it is observed that after an initialization operation 1000 during which the registers of the random access memory 405 are initialized, during a wait operation 1001 the processor 402 waits to receive then receives a response A and a corresponding TSM message. Then, during a test 1002, the processor 402 checks whether the signature totajsignature of the response A and of the message TSM is good using the public key KPubU of the secure processor, the public key KPubU having been sent by the secure processor to the ACC center during a previous operation not shown
- the processor 402 checks whether there are indeed SCH challenges present in the TSM message, SCH having been previously communicated by the broadcaster or the application server during an operation not shown.
- the processor 402 initializes a counter, / ' to zero. Then during an operation 1005, the processor 402 increments the counter / by one
- the processor 402 checks the validity of the rank challenge / ' by checking:
- the processor 402 checks whether the counter has reached the value of SCH. When the result of test 1007 is negative, the increment operation
- the processor 402 checks the consistency of the time stamp information itself.
- tProcess the maximum time to process a complete challenge including the computing time of the secure processor, the processing time of the central processor and the switching time.
- a simple verification consists in testing the value of TI [SCH] corresponding to the timestamp information of rank SCH which must be less than or equal to a value equal to the sum of the timestamp information of rank 1 and of the product of tProcess by the number of challenges minus 1:
- a finer check consists in testing for each value of an integer between 2 and the value SCH, the value of Tl [j] corresponding to the timestamp information of rank j which must be less than or equal to a value equal to the sum of the timestamp information of rank y-1 and tProcess:
- the time stamp information Tl [j] for a number j between 1 and SCH relates to a service of rank j: it depends not only on an effective time stamp but also on the service of rank j, each sort of service with its own timescale. It is thus possible to increase security by having a particular coding of the time stamp (which makes it possible to return to a “absolute time” scale).
- the test 1008 then takes this coding into account, implements an operation which makes it possible to pass from a time stamp relating to a service to an absolute time stamp independent of the service and considers for the test itself only absolute time stamps. If so, during an operation 1009, the TSM message is declared to be valid and the response A is transmitted to the application server with an absolute time stamp corresponding to T1 [1] to be used.
- the person skilled in the art can make any variant in defining the challenges.
- the invention is not limited to a television and / or radio broadcasting infrastructure comprising a broadcaster, decoders and an ACC center, but extends to any infrastructure for broadcasting digital streams with at least one server. application, this application being linked to the use of time stamping or events, such as for example an Internet server.
- the invention is not limited to the timestamp of responses to a broadcast question, but applies to the timestamp of any type of data transmitted or not by a broadcaster requiring a timestamp such as for example spontaneous messages , multimedia documents, purchase requests, time stamping being based on the use of broadcast digital streams.
- the invention is not limited to the terminals responsible for carrying out the time stamping which are of the digital multimedia decoder type but extends to any type of terminal suitable for receiving digital data streams.
- the invention is not limited to transmissions of responses to an ACC center via a modem or a direct link with a secure processor, but extends to transmissions using any means of transmission such as for example a bus or a network. .
- the invention is not limited to a purely material implantation but that it can also be implemented in the form of a sequence of instructions of a computer program or any form mixing a material part and a software part.
- the corresponding sequence of instructions may be stored in a removable storage means (such as for example a floppy disk, a CD-ROM or a DVD-ROM) or no, this storage means being partially or totally readable by a computer or a microprocessor.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Social Psychology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Television Systems (AREA)
- Computer And Data Communications (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Circuits Of Receivers In General (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0009255 | 2000-07-13 | ||
FR0009255A FR2811848A1 (en) | 2000-07-13 | 2000-07-13 | SYSTEM, METHOD AND DEVICE FOR TIMING AND VERIFYING HORODATE VALIDITY IN A DIGITAL BROADCASTING ENVIRONMENT |
PCT/FR2001/002286 WO2002007441A1 (en) | 2000-07-13 | 2001-07-12 | Time stamping and time stamp validity verification system, method and device in a digital broadcasting environment |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1300017A1 true EP1300017A1 (en) | 2003-04-09 |
Family
ID=8852514
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP01954094A Withdrawn EP1300017A1 (en) | 2000-07-13 | 2001-07-12 | Time stamping and time stamp validity verification system, method and device in a digital broadcasting environment |
Country Status (9)
Country | Link |
---|---|
US (1) | US20040049681A1 (en) |
EP (1) | EP1300017A1 (en) |
JP (1) | JP4825394B2 (en) |
KR (1) | KR100919907B1 (en) |
CN (1) | CN1265642C (en) |
AU (1) | AU2001276445A1 (en) |
FR (1) | FR2811848A1 (en) |
MX (1) | MXPA03000011A (en) |
WO (1) | WO2002007441A1 (en) |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7253919B2 (en) * | 2000-11-30 | 2007-08-07 | Ricoh Co., Ltd. | Printer with embedded retrieval and publishing interface |
US7861169B2 (en) | 2001-11-19 | 2010-12-28 | Ricoh Co. Ltd. | Multimedia print driver dialog interfaces |
US8539344B2 (en) * | 2001-11-19 | 2013-09-17 | Ricoh Company, Ltd. | Paper-based interface for multimedia information stored by multiple multimedia documents |
US7747655B2 (en) | 2001-11-19 | 2010-06-29 | Ricoh Co. Ltd. | Printable representations for time-based media |
US7788080B2 (en) | 2001-11-19 | 2010-08-31 | Ricoh Company, Ltd. | Paper interface for simulation environments |
US20040181815A1 (en) * | 2001-11-19 | 2004-09-16 | Hull Jonathan J. | Printer with radio or television program extraction and formating |
US7743347B2 (en) | 2001-11-19 | 2010-06-22 | Ricoh Company, Ltd. | Paper-based interface for specifying ranges |
US7149957B2 (en) | 2001-11-19 | 2006-12-12 | Ricoh Company, Ltd. | Techniques for retrieving multimedia information using a paper-based interface |
US7424129B2 (en) * | 2001-11-19 | 2008-09-09 | Ricoh Company, Ltd | Printing system with embedded audio/video content recognition and processing |
US7703044B2 (en) | 2001-11-19 | 2010-04-20 | Ricoh Company, Ltd. | Techniques for generating a static representation for time-based media information |
WO2004100450A1 (en) * | 2003-05-09 | 2004-11-18 | Koninklijke Philips Electronics N.V. | System and method for measurement report time stamping to ensure reference time correctness |
CN1784865B (en) * | 2003-05-09 | 2013-07-17 | 皇家飞利浦电子股份有限公司 | Method for measurement report time stamping to ensure reference time correctness |
US8452153B2 (en) | 2003-07-11 | 2013-05-28 | Ricoh Company, Ltd. | Associating pre-generated barcodes with temporal events |
US7685428B2 (en) * | 2003-08-14 | 2010-03-23 | Ricoh Company, Ltd. | Transmission of event markers to data stream recorder |
US7570380B2 (en) * | 2003-09-25 | 2009-08-04 | Ricoh Company, Ltd. | Printer user interface |
US20050071763A1 (en) * | 2003-09-25 | 2005-03-31 | Hart Peter E. | Stand alone multimedia printer capable of sharing media processing tasks |
JP2005108230A (en) * | 2003-09-25 | 2005-04-21 | Ricoh Co Ltd | Printing system with embedded audio/video content recognition and processing function |
US8077341B2 (en) | 2003-09-25 | 2011-12-13 | Ricoh Co., Ltd. | Printer with audio or video receiver, recorder, and real-time content-based processing logic |
US7864352B2 (en) * | 2003-09-25 | 2011-01-04 | Ricoh Co. Ltd. | Printer with multimedia server |
US7573593B2 (en) * | 2003-09-25 | 2009-08-11 | Ricoh Company, Ltd. | Printer with hardware and software interfaces for media devices |
US7528977B2 (en) * | 2003-09-25 | 2009-05-05 | Ricoh Co., Ltd. | Printer with hardware and software interfaces for peripheral devices |
US7505163B2 (en) * | 2003-09-25 | 2009-03-17 | Ricoh Co., Ltd. | User interface for networked printer |
US20050071746A1 (en) * | 2003-09-25 | 2005-03-31 | Hart Peter E. | Networked printer with hardware and software interfaces for peripheral devices |
US7440126B2 (en) * | 2003-09-25 | 2008-10-21 | Ricoh Co., Ltd | Printer with document-triggered processing |
US7528976B2 (en) * | 2003-09-25 | 2009-05-05 | Ricoh Co., Ltd. | Stand alone printer with hardware/software interfaces for sharing multimedia processing |
US20050068573A1 (en) * | 2003-09-25 | 2005-03-31 | Hart Peter E. | Networked printing system having embedded functionality for printing time-based media |
US8274666B2 (en) | 2004-03-30 | 2012-09-25 | Ricoh Co., Ltd. | Projector/printer for displaying or printing of documents |
CN100512556C (en) | 2007-03-01 | 2009-07-08 | 华为技术有限公司 | Method and communication terminal for processing short message |
CN101540897B (en) * | 2008-03-21 | 2013-04-24 | 中国科学院声学研究所 | Interactive television program stream time stamp issuing method for cable TV network |
CN101753245B (en) * | 2008-11-28 | 2013-08-07 | 华为技术有限公司 | Method and device for identifying service |
US20100287402A1 (en) * | 2009-05-11 | 2010-11-11 | Electronics And Telecommunications Research Institute | Timestamping apparatus and method |
WO2013065133A1 (en) * | 2011-11-01 | 2013-05-10 | 株式会社野村総合研究所 | Time verification system and time verification program |
CN104506503B (en) * | 2014-12-08 | 2019-11-05 | 北京北邮国安技术股份有限公司 | A kind of security certification system based on broadcasting and TV one-way transport network |
CN107515724B (en) * | 2016-06-16 | 2021-04-02 | 伊姆西Ip控股有限责任公司 | Method and apparatus for reproducing input and output of storage system |
CN111170110B (en) * | 2020-02-28 | 2021-04-30 | 深圳市通用互联科技有限责任公司 | Elevator data processing method, device, computer equipment and storage medium |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5136646A (en) * | 1991-03-08 | 1992-08-04 | Bell Communications Research, Inc. | Digital document time-stamping with catenate certificate |
JPH04363941A (en) * | 1991-02-18 | 1992-12-16 | Nippon Telegr & Teleph Corp <Ntt> | Intercept prevention method in asynchronous transfer mode communication |
US5519433A (en) * | 1991-11-20 | 1996-05-21 | Zing Systems, L.P. | Interactive television security through transaction time stamping |
FR2708768B1 (en) * | 1993-08-05 | 1995-09-01 | Gemplus Card Int | Secure system of participation in interactive games remotely with verification of the chronology of events. |
US5533021A (en) * | 1995-02-03 | 1996-07-02 | International Business Machines Corporation | Apparatus and method for segmentation and time synchronization of the transmission of multimedia data |
WO1998034403A1 (en) * | 1995-09-29 | 1998-08-06 | Intel Corporation | Apparatus and method for securing captured data transmitted between two sources |
US5822676A (en) * | 1995-12-14 | 1998-10-13 | Time Warner Entertainment Co. L.P. | Digital serialization of program events |
US5822432A (en) * | 1996-01-17 | 1998-10-13 | The Dice Company | Method for human-assisted random key generation and application for digital watermark system |
US5886995A (en) * | 1996-09-05 | 1999-03-23 | Hughes Electronics Corporation | Dynamic mapping of broadcast resources |
US5907619A (en) * | 1996-12-20 | 1999-05-25 | Intel Corporation | Secure compressed imaging |
US6105012A (en) * | 1997-04-22 | 2000-08-15 | Sun Microsystems, Inc. | Security system and method for financial institution server and client web browser |
US6209090B1 (en) * | 1997-05-29 | 2001-03-27 | Sol Aisenberg | Method and apparatus for providing secure time stamps for documents and computer files |
JPH1117674A (en) * | 1997-06-26 | 1999-01-22 | Mitsubishi Electric Corp | Time stamp device and transmission method for time information or communication information by the time stamp device |
US7367042B1 (en) * | 2000-02-29 | 2008-04-29 | Goldpocket Interactive, Inc. | Method and apparatus for hyperlinking in a television broadcast |
EP1148503A1 (en) * | 2000-04-08 | 2001-10-24 | Deutsche Thomson-Brandt Gmbh | Method and apparatus for recording on a storage medium or replaying from a storage medium data packets of a transport stream |
US6993246B1 (en) * | 2000-09-15 | 2006-01-31 | Hewlett-Packard Development Company, L.P. | Method and system for correlating data streams |
US6925649B2 (en) * | 2001-03-30 | 2005-08-02 | Sharp Laboratories Of America, Inc. | Methods and systems for mass customization of digital television broadcasts in DASE environments |
US6993695B2 (en) * | 2001-06-06 | 2006-01-31 | Agilent Technologies, Inc. | Method and apparatus for testing digital devices using transition timestamps |
US6874089B2 (en) * | 2002-02-25 | 2005-03-29 | Network Resonance, Inc. | System, method and computer program product for guaranteeing electronic transactions |
JP2003259316A (en) * | 2002-02-28 | 2003-09-12 | Toshiba Corp | Stream processing system and stream processing program |
-
2000
- 2000-07-13 FR FR0009255A patent/FR2811848A1/en active Pending
-
2001
- 2001-07-12 JP JP2002513207A patent/JP4825394B2/en not_active Expired - Fee Related
- 2001-07-12 EP EP01954094A patent/EP1300017A1/en not_active Withdrawn
- 2001-07-12 KR KR1020027018085A patent/KR100919907B1/en not_active IP Right Cessation
- 2001-07-12 US US10/332,675 patent/US20040049681A1/en not_active Abandoned
- 2001-07-12 AU AU2001276445A patent/AU2001276445A1/en not_active Abandoned
- 2001-07-12 MX MXPA03000011A patent/MXPA03000011A/en active IP Right Grant
- 2001-07-12 CN CNB018127398A patent/CN1265642C/en not_active Expired - Fee Related
- 2001-07-12 WO PCT/FR2001/002286 patent/WO2002007441A1/en active Application Filing
Non-Patent Citations (1)
Title |
---|
See references of WO0207441A1 * |
Also Published As
Publication number | Publication date |
---|---|
KR20030013481A (en) | 2003-02-14 |
CN1442020A (en) | 2003-09-10 |
CN1265642C (en) | 2006-07-19 |
KR100919907B1 (en) | 2009-10-06 |
WO2002007441A1 (en) | 2002-01-24 |
MXPA03000011A (en) | 2003-08-19 |
JP2004504778A (en) | 2004-02-12 |
FR2811848A1 (en) | 2002-01-18 |
JP4825394B2 (en) | 2011-11-30 |
US20040049681A1 (en) | 2004-03-11 |
AU2001276445A1 (en) | 2002-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2002007441A1 (en) | Time stamping and time stamp validity verification system, method and device in a digital broadcasting environment | |
EP0014653B1 (en) | System for conveying information between a transmitting centre and receiving stations, the system being provided with control means for gaining access to the conveyed information | |
EP2817775B1 (en) | Audience-measuring method | |
EP2052539B1 (en) | Method of revocation of security modules used to secure broadcast messages | |
US20100211608A1 (en) | Apparatus and method for generating a database that maps metadata to p2p content | |
FR2814085A1 (en) | Entertainment system based on competitive game with multiple choice questions, makes use of terminals connected to server enabling participation of players in remote locations | |
EP3552129B1 (en) | Method for recording a multimedia content, method for detecting a mark within a multimedia content, corresponding devices and computer programs | |
Kalker et al. | Issues with digital watermarking and perceptual hashing | |
EP3803670A1 (en) | A software application and a computer server for authenticating the identity of a digital content creator and the integrity of the creator's published content | |
EP1279280A1 (en) | Method and device for controlling multimedia data watermark | |
EP3732849B1 (en) | Method and system for identifying a user terminal in order to receive streaming protected multimedia content | |
US20220391474A1 (en) | Streaming fraud detection using blockchain | |
EP1436792B1 (en) | Authentication protocol with memory integrity verification | |
EP1964404A1 (en) | Method for transmitting conditional access content | |
FR2999851A1 (en) | METHOD FOR ACCESSING A SERVICE PROPOSED BY A REMOTE SERVER. | |
WO2023099418A1 (en) | Method for processing a transaction involving the use of a public identifier, device, system and computer programs corresponding thereto | |
EP3360034A1 (en) | Dynamically distributed backup method and system | |
FR3123480A1 (en) | Method for managing a local register of a node belonging to a set of nodes contributing to a distributed register | |
Lemmé | Extension of an existing P2P-Client for Evidence Collection/submitted by Alexander Lemmé, BSc | |
CN116962759A (en) | Method and device for linking playing equipment, equipment and storage medium | |
FR2863805A1 (en) | Digital image enrichment method, involves receiving contextual data transmitted by data broadcasting transmitters and associating contextual data with image data relative to images captured by camera in utilization environment | |
EP4441954A1 (en) | Method for processing a digital proof, system and corresponding program | |
FR3116370A1 (en) | Process and digital display system. | |
EP2677708B1 (en) | Communication method of an audiovisual message, and communication system | |
FR2913166A1 (en) | METHOD FOR DIGITIGH TATTOO OF PHOTO OR VIDEO CONTENT PERMITTING TRACEABILITY OF THIS CONTENT |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20030114 |
|
AK | Designated contracting states |
Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AT BE CH CY DE ES FR GB IT LI |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: THOMSON LICENSING |
|
17Q | First examination report despatched |
Effective date: 20091112 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: THOMSON LICENSING |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20170201 |