EP1803296A2 - Verfahren zur sendung von verwaltungsmeldungen aus einem verwaltungscenter an mehrere multimediaeinheiten - Google Patents
Verfahren zur sendung von verwaltungsmeldungen aus einem verwaltungscenter an mehrere multimediaeinheitenInfo
- Publication number
- EP1803296A2 EP1803296A2 EP05810921A EP05810921A EP1803296A2 EP 1803296 A2 EP1803296 A2 EP 1803296A2 EP 05810921 A EP05810921 A EP 05810921A EP 05810921 A EP05810921 A EP 05810921A EP 1803296 A2 EP1803296 A2 EP 1803296A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- security
- management
- messages
- groups
- configuration
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
- H04N21/4181—External card to be used in combination with the client device, e.g. for conditional access for conditional access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26606—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/163—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
Definitions
- the present invention relates to a method of transmitting management messages by a management center to a plurality of multimedia units.
- access to data disseminated by a data provider is subject to the acquisition of rights. These rights are sent in EMM authorization messages. Access to the data is generally subject to obtaining keys, which are generally cw control words, sent as ECM management messages. The presence of a right for each subscriber and each event is verified by means of a security module.
- the security module can be made essentially in four distinct forms.
- One of them is a microprocessor card, a smart card, or more generally an electronic module (having a shape of key, badge, ).
- Such a module is generally removable and connectable to the decoder.
- the form with electrical contacts is the most used, but does not exclude a contactless connection, for example type ISO 14443.
- a second known form is that of an integrated circuit package placed, generally definitively and irremovable in the housing of the decoder.
- a variant consists of a circuit mounted on a base or connector such as a SIM module connector.
- the security module is integrated in an integrated circuit package also having another function, for example in a descrambling module of the decoder or the microprocessor of the decoder.
- the security module is not implemented in hardware form, but its function is implemented in software-only form. Since in all four cases, although the security level differs, the function is identical, we will talk about security module regardless of how to perform its function or the form that can take this module.
- a falsified module skips the rights verification step performed in a conventional module. Instead, it processes the ECM management messages to extract the control words and can access the data in the same way as a conventional module.
- part of the content for example the video portion of an audio / video content is sent in the clear.
- the audio part is encrypted according to the different encryption methods compatible with the decoders of the set-top box. This data is sent several times in several different encryption formats.
- This invention is therefore not intended to handle fully encrypted content. This creates a security problem since some of the content is not encrypted at all.
- WO 03/061289 does not make it possible to replace only a part of the decoders giving access to an encrypted content made available by a content provider. Indeed, if one wishes to prevent access to the content by cloned decoders, it is necessary to change all the decoders that allow access to this content.
- the present invention proposes to overcome the disadvantages of the devices of the prior art by providing a system and a method in which the knowledge of the secrets of a security module does not allow to know the secrets of all the modules. This implies that in case of cloning of security modules allowing unauthorized access to content made available by a content provider, it is not necessary to replace all the security modules linked to this provider, but only some of them.
- a management message transmission method by a management center to a plurality of multimedia units, each unit having a security module comprising at least one global encryption key used in connection with an encryption module, characterized in that it consists in dividing the set of security modules allowing access to encrypted data from a given provider in at least two groups, a first group of security module having a first configuration of the security elements and a second group of security modules having a second configuration of the security elements, the first configuration being different from the second configuration.
- FIG. 2 represents a first control message format such that it can be used in the method of the invention
- FIGS. 3 and 4 show other control message formats that can be used in the invention
- FIG. 5 schematically illustrates authorization and control messages according to the present invention
- FIG. 6 schematically illustrates a variant of types of authorization and control messages used in the present invention.
- the system for implementing the method of the invention comprises a management center CG in charge of managing a plurality of multimedia units, these multimedia units comprising an STB decoder, a security module SC and means for receiving messages.
- the management center CG is in charge of sending EMM authorization messages and ECM control messages in particular. These messages are transmitted by means of transmission and are called management messages.
- the ECM control messages contain in particular one or more CW control words that make it possible to decrypt encrypted data. These control messages are encrypted by means of a transmission key.
- the transmission key is sent to the concerned security modules in EMM authorization messages, themselves encrypted by means of a global key.
- the management center manages three multimedia units divided into two groups.
- a management center can be in charge of several hundred thousand multimedia units, or even several million. According to the invention, these can be divided into a number of groups that varies between two and about twenty. The upper limit is not technically defined, but too many groups make messaging difficult.
- the security modules of the represented groups all allow access to the data transmitted by the same data provider.
- the multimedia units of the first group GR1 use an initial configuration different from the configuration of the units of the second group GR2. This configuration can be one or more of the following: • Global key, key length, module or encryption algorithm, message format.
- the security level of each of the configurations is substantially equivalent.
- a security module may for example initially be made so as to belong to any group. The membership of a given group can be done for example after the installation of the security module in a decoder of a buyer, by removing the means of interpreting messages intended for other groups than the one chosen for this security module. This allows in particular to link a security module to a postal code of a buyer.
- ECM control messages can be sent to two different groups according to the formats illustrated in FIGS. 3.
- the ECM control message 1 contains a control word CW, AC access conditions to a determined content, possibly other non-represented fields and a padding value PAD which can for example be a random value or a predefined fixed value.
- the content of these fields is encrypted by means of a transmission key TK using a first encryption algorithm noted alg. 1.
- an ECM control message 2 intended for the second group of users GR2 contains the same fields as before, that is to say a control word CW, the conditions of access AC and the value PAD filling. It should be noted that this filling value can be identical to that of the ECM control message 1 or on the contrary be different.
- the contents of these fields are encrypted using the same transmission key TK as the ECM control message 1, but by means of a different encryption algorithm alg. 2.
- Usable encryption algorithms are well known and can be for example DES, IDEA, 3-DES, AES.
- the messages have a common part which is on the one hand their content in clear and on the other hand, the transmission key.
- ECM control messages may be sent to two different groups according to the formats illustrated in FIGS. 2 and 4.
- the content of the ECM control message 1 has been detailed above.
- the ECM control message 3, illustrated by FIG. 4 contains the same fields as before, that is to say a control word CW, the access conditions AC and the padding value PAD, but they are not placed in the same order as before.
- the access conditions may for example be first, the second control word and the third fill value. It is clear that an indication must also appear in the control message or in another place indicating the order of the fields.
- the values contained in these fields are encrypted by a transmission key and an algorithm that may be the same as those used in the case of the first ECM control message 1.
- the common part between the control messages sent to the groups of decoders is formed of the content of the message, the transmission key and the encryption algorithm. Only the order of the content of the messages changes.
- a combination of the two previous embodiments can also be realized.
- the order of the fields is different between the two messages and the algorithm for encrypting messages from two different groups is also different.
- FIG. 5 illustrates an embodiment of the method in which the EMM authorization messages are common to the members of groups of different security modules. These authorization messages contain transmission keys TK1, TK2 associated with different groups of security modules. In the case shown, different ECM control messages are sent to the different security modules of different groups, the messages intended for one of the groups being encrypted by means of a first transmission key TK1 and the messages of the other group of security modules being encrypted by means of another transmission key TK2.
- FIG. 6 illustrates another "inverse" variant of that of FIG. 5.
- the ECM control messages are common to the different groups of multimedia units concerned.
- the EMM authorization messages are different for each group of multimedia units. These messages may be different at the level of the encryption algorithm used, the key, in value and / or length or content formatting in particular.
- the rights transmitted by these EMM authorization messages are different for each group of security modules.
- This embodiment has the advantage that the control messages, which are those requiring the largest bandwidth, are common to several groups of security modules or to all groups.
- the authorization messages which require less bandwidth, are different for the different groups of security modules.
- the messages, and in particular the ECM control messages are sent to some multimedia units of the first group GR1 as well as to multimedia units of the second group GR2.
- the management center determines, according to a table stored in this center, what is the initial configuration of the multimedia unit concerned. He will determine the keys to use for each multimedia unit. The key in question is then introduced into a corresponding encryption module EN, so as to encrypt the EMM authorization messages. This is shown in particular in FIG.
- Each media unit group has its own information, so that a media unit of a given group is able to decrypt and process a message that is intended for that group when it will not be able to process a message to another group.
- This method has the advantage that it is not necessary to replace all the security modules when one or more clones are detected. Only the group containing the clones must be replaced. This greatly simplifies module changes and also greatly reduces the costs associated with such a change. This also has the consequence that it is interesting to modify the configuration of a group as soon as a relatively small number of clone modules is detected or that the existence of a relatively small number of clone modules is suspected.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05810921A EP1803296A2 (de) | 2004-10-15 | 2005-10-13 | Verfahren zur sendung von verwaltungsmeldungen aus einem verwaltungscenter an mehrere multimediaeinheiten |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04105093A EP1648170A1 (de) | 2004-10-15 | 2004-10-15 | Verfahren zur Übertragung von Verwaltungsnachrichten von einem Verwaltungszentrum an eine Mehrzahl von Multimedia-Einheiten |
PCT/EP2005/055249 WO2006040346A2 (fr) | 2004-10-15 | 2005-10-13 | Méthode de transmission de messages de gestion par un centre de gestion à destination d'une pluralité d'unités multimédia |
EP05810921A EP1803296A2 (de) | 2004-10-15 | 2005-10-13 | Verfahren zur sendung von verwaltungsmeldungen aus einem verwaltungscenter an mehrere multimediaeinheiten |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1803296A2 true EP1803296A2 (de) | 2007-07-04 |
Family
ID=34929709
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04105093A Withdrawn EP1648170A1 (de) | 2004-10-15 | 2004-10-15 | Verfahren zur Übertragung von Verwaltungsnachrichten von einem Verwaltungszentrum an eine Mehrzahl von Multimedia-Einheiten |
EP05810921A Ceased EP1803296A2 (de) | 2004-10-15 | 2005-10-13 | Verfahren zur sendung von verwaltungsmeldungen aus einem verwaltungscenter an mehrere multimediaeinheiten |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04105093A Withdrawn EP1648170A1 (de) | 2004-10-15 | 2004-10-15 | Verfahren zur Übertragung von Verwaltungsnachrichten von einem Verwaltungszentrum an eine Mehrzahl von Multimedia-Einheiten |
Country Status (7)
Country | Link |
---|---|
US (1) | US20060083371A1 (de) |
EP (2) | EP1648170A1 (de) |
KR (1) | KR20070064630A (de) |
CN (1) | CN101040525B (de) |
CA (1) | CA2583977A1 (de) |
TW (1) | TW200629902A (de) |
WO (1) | WO2006040346A2 (de) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2129116A1 (de) | 2008-05-29 | 2009-12-02 | Nagravision S.A. | Einheit und Verfahren zur gesicherten Verarbeitung von Audio-/Video-Daten mit kontrolliertem Zugriff |
US8782417B2 (en) | 2009-12-17 | 2014-07-15 | Nagravision S.A. | Method and processing unit for secure processing of access controlled audio/video data |
EP2337347A1 (de) * | 2009-12-17 | 2011-06-22 | Nagravision S.A. | Verfahren und Vearbeitungseinheit zur sicheren Verarbeitung von Audio-/Videodaten mit Zugangskontrolle |
EP2802152B1 (de) | 2013-05-07 | 2017-07-05 | Nagravision S.A. | Verfahren zur sicheren Verarbeitung eines Stroms aus verschlüsselten digitalen Audio-/Videodaten |
US9363075B2 (en) * | 2013-10-18 | 2016-06-07 | International Business Machines Corporation | Polymorphic encryption key matrices |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997016924A1 (en) * | 1995-10-31 | 1997-05-09 | Philips Electronics N.V. | Time-shifted conditional access |
US20030174844A1 (en) * | 1999-03-30 | 2003-09-18 | Candelore Brant L. | Method and apparatus for protecting the transfer of data |
US20040101138A1 (en) * | 2001-05-22 | 2004-05-27 | Dan Revital | Secure digital content delivery system and method over a broadcast network |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5029207A (en) * | 1990-02-01 | 1991-07-02 | Scientific-Atlanta, Inc. | External security module for a television signal decoder |
US5185797A (en) * | 1991-03-27 | 1993-02-09 | Motorola, Inc. | Encrypted trunked control channel system |
ATE429099T1 (de) * | 1994-02-24 | 2009-05-15 | Comcast Cable Holdings Llc | Verfahren und vorrichtung zur erstellung einer kryptographischen verbindung zwischen elementen eines systems |
US6606374B1 (en) * | 1999-06-17 | 2003-08-12 | Convergys Customer Management Group, Inc. | System and method for recording and playing audio descriptions |
US20020114465A1 (en) * | 2000-01-05 | 2002-08-22 | Shen-Orr D. Chaim | Digital content delivery system and method |
US7224806B2 (en) * | 2000-11-13 | 2007-05-29 | Thomson Licensing | Threshold cryptography scheme for conditional access systems |
KR100988435B1 (ko) * | 2002-01-02 | 2010-10-18 | 소니 일렉트로닉스 인코포레이티드 | 신호를 암호 해독하기 위한 장치 및 방법 |
US20040083177A1 (en) * | 2002-10-29 | 2004-04-29 | General Instrument Corporation | Method and apparatus for pre-encrypting VOD material with a changing cryptographic key |
-
2004
- 2004-10-15 EP EP04105093A patent/EP1648170A1/de not_active Withdrawn
-
2005
- 2005-10-12 TW TW094135561A patent/TW200629902A/zh unknown
- 2005-10-12 US US11/247,224 patent/US20060083371A1/en not_active Abandoned
- 2005-10-13 KR KR1020077008397A patent/KR20070064630A/ko not_active Application Discontinuation
- 2005-10-13 CN CN2005800350292A patent/CN101040525B/zh active Active
- 2005-10-13 WO PCT/EP2005/055249 patent/WO2006040346A2/fr active Application Filing
- 2005-10-13 EP EP05810921A patent/EP1803296A2/de not_active Ceased
- 2005-10-13 CA CA002583977A patent/CA2583977A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997016924A1 (en) * | 1995-10-31 | 1997-05-09 | Philips Electronics N.V. | Time-shifted conditional access |
US20030174844A1 (en) * | 1999-03-30 | 2003-09-18 | Candelore Brant L. | Method and apparatus for protecting the transfer of data |
US20040101138A1 (en) * | 2001-05-22 | 2004-05-27 | Dan Revital | Secure digital content delivery system and method over a broadcast network |
Also Published As
Publication number | Publication date |
---|---|
US20060083371A1 (en) | 2006-04-20 |
CN101040525A (zh) | 2007-09-19 |
EP1648170A1 (de) | 2006-04-19 |
WO2006040346A2 (fr) | 2006-04-20 |
KR20070064630A (ko) | 2007-06-21 |
CA2583977A1 (en) | 2006-04-20 |
CN101040525B (zh) | 2011-10-19 |
WO2006040346A3 (fr) | 2006-10-19 |
TW200629902A (en) | 2006-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1529369B1 (de) | Vorrichtung zum gesicherten datenaustausch zwischen zwei vorrichtungen | |
EP1815681B1 (de) | Digitale verarbeitungseinheit für audio- und videodaten sowie verfahren zur steuerung des zugangs zu diesen daten | |
EP1525748B1 (de) | Verfahren und elektronischer modul für sicheren datenübetragung | |
EP1742475A1 (de) | Verfahren und Vorrichtung zu verschlüsselten Daten mit bedingtem Zugriff | |
EP1827019A1 (de) | Zugangskontroll-verfahren zu verschlüsselten Daten | |
EP1890493A1 (de) | Verfahren zum Widerrufen von Sicherheitsmodulen zur Sicherung Rundfunknachrichten | |
WO2006056609A1 (fr) | Procédé de contrôle d'accès à des données à accès conditionnel | |
EP1497986B1 (de) | System zur verwaltung von rechten zum verschlüsselten und auf einem persönlichen digitalen aufnahmegerät gespeicherten inhalt | |
WO2006040346A2 (fr) | Méthode de transmission de messages de gestion par un centre de gestion à destination d'une pluralité d'unités multimédia | |
EP1374586B1 (de) | Vorrichtung und verfahren zur verschlüsselter datenübertragung mit verschlüsseltem schlüssel | |
FR2838587A1 (fr) | Procede de gestion de droits d'acces a des services de television | |
EP1352523A1 (de) | Verfahren zum speichern verschlüsselter daten | |
EP1419640B1 (de) | Verfahren zur herstellung von neuer vorrichtungen und verfahren zum empfang und zur rundfunk von daten in einem digitalen lokalen netzwerk | |
EP3672141B1 (de) | Überprüfungsverfahren der integrität und entschlüsselung einer verschlüsselten nachricht, entsprechendes kryptomodul und endgerät | |
EP1723790B1 (de) | Verfahren zum sichern von durch einen ausstrahler ausgestrahltem verschlüsseltem inhalt | |
EP2039157A2 (de) | Verfahren zur verarbeitung von nachrichten zur kontrollle der empfangsberechtigung | |
EP1502382B1 (de) | Netzwerkzugangsregelverfahren | |
EP1775950A1 (de) | Verfahren zur Verarbeitung von Daten mit bedingtem Zugang und Decoder für die Umsetzung dieses Verfahrens | |
EP1492346A1 (de) | System zur gleichzeitigem Verarbeitung von mindestens 2 Kanälen mit bedingtem Zugriff | |
EP2326035B1 (de) | Verarbeitungsverfahren durch ein Nachrichtensicherheitsmodul mit Zugriffskontrolle auf einen Inhalt, und damit verbundenes Sicherheitsmodul | |
WO2010004162A1 (fr) | Procede et systeme tracables de diffusion de donnees numeriques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20070502 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: CAGNARD, PAUL-JEAN Inventor name: HAUERT, PATRICK Inventor name: DUVAL, GREGORY Inventor name: KUDELSKI, HENRI Inventor name: COCHARD, JIMMY |
|
DAX | Request for extension of the european patent (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NAGRAVISION S.A. |
|
17Q | First examination report despatched |
Effective date: 20130204 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20171228 |