EP1869881A1 - Method of packaging broadcast contents - Google Patents

Method of packaging broadcast contents

Info

Publication number
EP1869881A1
EP1869881A1 EP06747357A EP06747357A EP1869881A1 EP 1869881 A1 EP1869881 A1 EP 1869881A1 EP 06747357 A EP06747357 A EP 06747357A EP 06747357 A EP06747357 A EP 06747357A EP 1869881 A1 EP1869881 A1 EP 1869881A1
Authority
EP
European Patent Office
Prior art keywords
broadcast contents
stored
copy control
control bit
usage rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP06747357A
Other languages
German (de)
French (fr)
Other versions
EP1869881A4 (en
Inventor
Sun-Nam Lee
Myung-Sun Kim
Sung-Hyu Han
Young-Sun Yoon
Jae-Heung Lee
Bong-Seon Kim
Moon-Young Choi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020050062124A external-priority patent/KR100823256B1/en
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Publication of EP1869881A1 publication Critical patent/EP1869881A1/en
Publication of EP1869881A4 publication Critical patent/EP1869881A4/en
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8355Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
    • H04N21/83555Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed using a structured language for describing usage rules of the content, e.g. REL
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • G11B20/00753Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
    • G11B20/00768Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • G11B20/00753Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
    • G11B20/00768Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags
    • G11B20/00775Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags wherein said copy control information is encoded in an encryption mode indicator [EMI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/433Content storage operation, e.g. storage operation in response to a pause request, caching operations
    • H04N21/4334Recording operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8355Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91328Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a copy management signal, e.g. a copy generation management signal [CGMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91357Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
    • H04N2005/91364Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence

Definitions

  • Methods consistent with the present invention relate to packaging broadcast contents which prevents unauthorized copying of broadcast contents transmitted through a digital broadcast receiver and allows only a device having a corresponding content identification to play back the broadcast contents, thereby protecting the broadcast contents.
  • Digital broadcast contents are transmitted from contents providers to users. Users are authorized to use digital broadcast contents only after they obtain the rights to use the digital broadcast contents. Thus, digital broadcast contents must be protected from unauthorized users.
  • the U.S. Federal Communications Commission is considering a requirement to add a one-bit broadcast flag (BF) to high definition (HD)-grade contents digitally broadcast within the U.S. to prohibit the indiscriminate redistribution of digital terrestrial broadcast programs.
  • the FCC intends to promote the safe use of digital broadcast contents using a technology that prevents unauthorized users from using digital broadcast contents when a BF included in the digital broadcast contents is on.
  • FIG. 1 is a conventional table showing operations which are allowed or not allowed according to a BF. Referring to FIG. 1, if a copy control bit included in broadcast contents is a BF, permission to store or copy the broadcast contents is given according to the type of the BF.
  • the Open Cable standard is set to become the next-generation cable broadcast standard of the U.S.
  • the Open Cable standard makes it compulsory to use copy control information (CCI) to control or restrict the storing or copying of contents received.
  • CCI is two-bit control information which controls the copying of cable broadcast contents by indicating 'copy free' (00), 'copy once' (01), 'copy no more' (10), and 'copy never' (11).
  • FIG. 2 is another conventional table showing operations which are allowed or not allowed according to CCI. Referring to FIG. 2, if a copy control bit included in broadcast contents is CCI, permission to store and/or copy the broadcast contents is given according to the type of the CCI.
  • the present invention provides a method of packaging broadcast contents which prevents unauthorized copying of broadcast contents transmitted through a digital broadcast receiver and allows only a device having a corresponding content identification to play back the broadcast contents, thereby protecting the broadcast contents.
  • the unauthorized storing, copying, or redistribution of broadcast contents that are received through a digital broadcast receiver can be prevented using a BF or CCI included in the broadcast contents.
  • broadcast contents are packaged using a content identification which will be used as license information when the broadcast contents are decrypted, even if the broadcast contents were copied without authorization, the broadcast contents cannot be played back. Thus, the broadcast contents can be protected more securely.
  • FIG. 1 is a conventional table showing operations which are allowed or not allowed according to a BF;
  • FIG. 2 is another conventional table showing operations which are allowed or not allowed according to CCI;
  • FIG. 3 is a flowchart illustrating a method of packaging broadcast contents according to an exemplary embodiment of the present invention
  • FIG. 4 is a flowchart illustrating a method of packaging broadcast contents according to another exemplary embodiment of the present invention.
  • FIG. 5 is a flowchart illustrating a method of packaging broadcast contents according to another exemplary embodiment of the present invention.
  • FIG. 6 is a flowchart illustrating a method of packaging broadcast contents according to another exemplary embodiment of the present invention.
  • FIG. 7 illustrates an example of usage rule information according to an exemplary embodiment of the present invention.
  • FIG. 8 illustrates an operation of packaging broadcast contents based on CCI of
  • FIG. 7 according to an exemplary embodiment of the present invention.
  • a method of packaging broadcast contents including: (a) extracting a copy control bit from input broadcast contents and determining whether the broadcast contents will be stored after being encrypted based on the extracted copy control bit; (b) creating usage rule information which includes an encryption method of the broadcast contents if it is determined that the broadcast contents will be stored after being encrypted; (c) extracting the copy control bit from each new broadcast content sequentially input after operation (a) and detecting broadcast contents which comprise copy control bits indicating that the broadcast contents will be stored without being encrypted; and (d) encrypting the broadcast contents input in operation (a) through the broadcast contents before the broadcast contents detected in operation (c) using the encryption method and packaging and storing the encrypted broadcast contents and the usage rule information.
  • a method of packaging broadcast contents including: (a) extracting a copy control bit from input broadcast contents and determining whether the broadcast contents will be stored, and if stored, whether the broadcast contents will be stored after being encrypted based on the extracted copy control bit; (b) creating usage rule information which includes an encryption method of the broadcast contents if it is determined that the broadcast contents will be stored after being encrypted; (c) extracting the copy control bit from each new broadcast content sequentially input after operation (a) and detecting broadcast contents which comprise copy control bits indicating other than characteristics that the broadcast contents will be stored after being encrypted; and (d) encrypting the broadcast contents input in operation (a) through the broadcast contents detected in operation (c) using the encryption method and packaging and storing the encrypted broadcast contents and the usage rule information.
  • a method of packaging broadcast contents including: (a) extracting a copy control bit which indicates whether broadcast contents will be stored after being encrypted from each broadcast content sequentially input; (b) detecting whether characteristics of the extracted copy control bit are changed; (c) creating first usage rule information which comprises an encryption method of corresponding broadcast contents if the copy control bit indicates that the broadcast contents will be stored after being encrypted and creating second usage rule information indicating the absence of the encryption method if the copy control bit indicates that the broadcast contents will be stored without being encrypted; and (d) performing operations (a) through (c) on a predetermined number of broadcast contents, and packaging and storing first and second usage rule information created as a result of performing operations (a) through (c), broadcast contents encrypted using the encryption method included in the first usage rule information generated by the broadcast contents, and broadcast contents that generate the second usage rule information.
  • a method of packaging broadcast contents including: (a) extracting a copy control bit which indicates whether broadcast contents will be stored and if stored, whether the broadcast contents will be stored after being encrypted from each broadcast content sequentially input; (b) detecting whether characteristics of the extracted copy control bit are changed; (c) creating first usage rule information which comprises an encryption method of corresponding broadcast contents if the copy control bit indicates that the broadcast contents will be stored after being encrypted, creating second usage rule information indicating the absence of the encryption method if the copy control bit indicates that the broadcast contents will be stored without being encrypted, and eliminating the broadcast contents if the copy control bit indicates that the broadcast contents will not be stored; and (d) performing operations (a) through (c) on a predetermined number of broadcast contents, and packaging and storing usage rule information that comprises the first and second usage rule information created as a result of performing operations (a) through (c), broadcast contents encrypted using the encryption method included in the first usage rule information generated by the broadcast contents, and broadcast contents that generate the second usage
  • a first source of contents is local channels.
  • Contents broadcast on local channels accompany a broadcast flag (BF) as a copy control bit, and the BF is either on or off.
  • BF broadcast flag
  • the U.S. FCC is considering adding a one-bit BF to high definition (HD)-grade contents digitally broadcast within the U.S.
  • the FCC also endeavors to develop a digital broadcasting implementation technology standard, which prevents unauthorized users from using digital broadcast contents when the BF included in the digital broadcast contents is on.
  • a second source of contents is cable channels.
  • Copy control information accompanies contents broadcast on cable channels.
  • CCI includes ' copy free,' 'copy once,' 'copy no more,' and 'copy never.'
  • usage rule information is created based on a BF or CCI included in broadcast contents and detected. Since a method of detecting a BF or CCI falls outside the scope of the present invention, its description will be omitted.
  • FIG. 3 is a flowchart illustrating a method of packaging broadcast contents according to an exemplary embodiment of the present invention. The method is applied to a case where a copy control bit included in contents that are broadcast on a channel is a BF. Based on the copy control bit, it can be determined whether broadcast contents will be stored after being encrypted or without being encrypted.
  • a copy control bit is extracted from input broadcast contents (S300). Based on the copy control bit extracted in operation S300, it is determined whether the broadcast contents will be stored after being encrypted (S310). If it is determined that the broadcast contents will be stored after being encrypted in operation S310, usage rule information that includes an encryption method of the broadcast contents is created (S320). The usage rule information further includes content identification information which will be used as license information when the broadcast contents are decrypted. The usage rule information will be described in more detail later with reference to FIG. 7.
  • a copy control bit is extracted from each new broadcast content sequentially input (S330). Then, it is determined whether broadcast contents including copy control bits indicating that the broadcast contents will be stored without being encrypted are detected (S340). If it is determined that the broadcast contents including copy control bits indicating that the broadcast contents will be stored without being encrypted are not detected, operation S330 is re-performed.
  • the broadcast contents including copy control bits indicating that the broadcast contents will be stored without being encrypted are detected in operation S340, the broadcast contents including the copy control bits which indicate that the broadcast contents will be stored after being encrypted are encrypted using the encryption method included in the usage rule information created in operation S320 (S350).
  • the broadcast contents encrypted in operation S350 and the usage rule information are packaged and stored (S360).
  • the usage rule information created in S320 may be packaged and stored in a file and placed before the broadcast contents input in operation S300.
  • usage rule information that includes information indicating the absence of the encryption method is created (S325).
  • a copy control bit is extracted from each new broadcast content sequentially input after operation S300 (S335).
  • the broadcast contents including copy control bits which indicate that the broadcast contents will be stored after being encrypted are detected in operation S345, the broadcast contents including the copy control bits which indicate that the broadcast contents will be stored without being encrypted and the usage rule information are packaged and stored (S365).
  • the usage rule information created in S325 may be packaged and stored in a file and placed before the broadcast contents input in operation S300.
  • FIG. 4 is a flowchart illustrating a method of packaging broadcast contents according to another exemplary embodiment of the present invention. The method is applied to a case where a copy control bit included in contents that are broadcast on a channel is CCI. Based on a copy control bit, it can be determined whether broadcast contents will be stored and, if stored, whether the broadcast contents will be stored after being encrypted or without being encrypted.
  • a copy control bit is extracted from input broadcast contents (S400). Based on the copy control bit extracted in operation S400, it is determined whether the broadcast contents will be stored (S410). If it is determined that the broadcast contents will not be stored, the broadcast contents input in operation S400 are eliminated (S415).
  • a copy control bit is extracted from each new broadcast content sequentially input after operation S400 (S440). Then, it is determined whether broadcast contents which include copy control bits indicating characteristics other than the broadcast contents will be stored without being encrypted are detected (S450). If it is determined that the broadcast contents which include copy control bits indicating characteristics other than the broadcast contents will be stored without being encrypted are not detected, operation S440 is re -performed.
  • the broadcast contents which include copy control bits indicating characteristics other than the broadcast contents are stored without being encrypted in operation S450, the broadcast contents which include the copy control bits indicating other than the characteristics that the broadcast contents will be stored after being encrypted are encrypted using the encryption method which is included in the usage rule information created in operation S430 (S460).
  • the broadcast contents encrypted in operation S430 and the usage rule information are packaged and stored (S470).
  • the usage rule information created in S430 may be packaged and stored in a file and placed before the broadcast contents input in operation S400.
  • usage rule information that includes information indicating the absence of the encryption method is created (S435).
  • a copy control bit is extracted from each new broadcast content sequentially input after operation S400 (S445).
  • the broadcast contents which include copy control bits indicating characteristics other than the broadcast contents will be stored without being encrypted are detected in operation S455
  • the broadcast contents which include the copy control bits indicating that the broadcast contents will be stored without being encrypted and the usage rule information created in operation S435 are packaged and stored (S475).
  • the usage rule information created in S435 may be packaged and stored in a file and placed before the broadcast contents input in operation S400.
  • FIG. 5 is a flowchart illustrating a method of packaging broadcast contents according to another exemplary embodiment of the present invention. The method is applied to a case where a copy control bit included in contents that are broadcast on a channel is a BF. Based on a copy control bit, it can be determined whether broadcast contents will be stored after being encrypted or without being encrypted.
  • first usage rule information including an encryption method of the broadcast contents is created.
  • the first usage rule information further includes content identification information which will be used as license information when the broadcast contents are decrypted. The first usage rule information will be described in more detail later with reference to FIG. 7.
  • the broadcast contents are encrypted using the encryption method included in the first usage rule information created in operation S530 (S540). If it is determined that the broadcast contents will be stored without being encrypted in operation S520, second usage information that includes information indicating the absence of the encryption method is created (S535).
  • the second usage rule information may further include content identification information. The second usage rule information will be described in more detail later with reference to FIG. 7.
  • At least one of the first and second usage rule information, and at least one of the broadcast contents that are encrypted in operation S530 and the broadcast contents that can be stored without being encrypted are packaged and stored (S560).
  • the first usage rule information and the second usage rule information may be packaged and stored in one file and placed before the encrypted and unencrypted broadcast contents.
  • FIG. 6 is a flowchart illustrating a method of packaging broadcast contents according to another exemplary embodiment of the present invention.
  • a copy control bit indicating whether broadcast contents will be stored and whether the broadcast contents will be stored after being encrypted is extracted from each broadcast content sequentially input (S600).
  • first usage rule information including an encryption method of the broadcast contents is created (S640).
  • the first usage rule information further includes content identification information which will be used as license information when the broadcast contents are decrypted. The first usage rule information will be described in more detail later with reference to FIG. 7.
  • the broadcast contents are encrypted using the encryption method included in the first usage rule information created in operation S640 (S650). If it is determined that the broadcast contents will be stored without being encrypted in operation S630, second usage information that includes information indicating the absence of the encryption method is created (S645).
  • the second usage rule information may further include content identification information. The second usage rule information will be described in more detail later with reference to FIG. 7.
  • FIG. 7 illustrates usage rule information created using the methods of packaging broadcast contents of FIGS. 3 through 6 according to an exemplary embodiment of the present invention.
  • a digital broadcasting receiver receives broadcast contents composed of 188-byte transport stream (TS) packets.
  • the digital broadcasting receiver also receives a four-byte arrival time stamp, which is a counter value for arranging the TS packets received.
  • TS transport stream
  • Usage rule information indicates whether a 188-byte TS packet will be stored and, if stored, whether the 188-byte TS packet will be stored after being encrypted.
  • the usage rule information is placed before the 188-byte TS packet and includes a 'magic_number,' a 'size_of_UsageRuleInformation,' a 'num_of- sequences,' a 'sequence_start_packet_number,' and a 'SequenceUsageRulelnformation.'
  • the 'magic_number' is a grammar indicating the start of a 'UsageRulelnformation'.
  • the 'size_of_UsageRuleInformation' indicates the entire size of the 'UsageRulelnformation' including the 'magic_number'.
  • the 'num_ of_sequences' is a flag indicating how many packet sequences are included in broadcast contents.
  • a packet sequence starts anew when a 'usagerule_information' is changed.
  • the 'num_of_sequences' increases.
  • the 'num_of_sequences' increases.
  • the 'sequence_start_packet_number' indicates a starting number of packet sequences.
  • a 'SequenceUsageRulelnformation' includes an 'is_encrypted,' an
  • the 'is_encrypted' indicates whether a packet sequence is encrypted.
  • the 'is_encrypted' may include 1 bit and may be set to 0x1 indicating 'encryption' and 0x0 indicating 'non-encryption.
  • the 'EachStatus_BfCci' indicates a BF or CCI.
  • the 'EachStatus_BfCci' may include 3 bits and may be set to 0x000 indicating 'BF off,' to 0x001 indicating 'BF on,' to 0x010 indicating 'copy free,' to 0x011 indicating 'copy once,' to 0x100 indicating 'copy no more,' and to 0x101 indicating 'copy never.
  • the 'encryption_scheme' indicates encryption schemes such as AES-128-CBC and AES- 128-CTR.
  • the 'encryption_scheme' may include 4 bits.
  • the 'encryption_parameters' indicates parameter values used for decryption.
  • the 'encryption_parameters' may include 8 bits.
  • the 'content_id' is a unique value assigned to each content and used when content identification for a corresponding content is required like a licence.
  • the 'Detaillnformation' may include title and duration. Title indicates the title of a packet sequence, and duration indicates the duration of the packet sequence.
  • FIG. 7 illustrates only an example of usage rule information according to an exemplary embodiment of the present invention. Thus, terms and their descriptions illustrated in FIG. 7 must not be limited thereto.
  • FIG. 8 illustrates an operation of packaging broadcast contents based on the CCI of
  • FIG. 7 illustrates a case where a digital broadcast receiver is currently receiving cable broadcast contents.
  • a program includes twelve 188-byte TS packets.
  • the CCI of the first through fourth TS packets indicates 'copy free,' that of the fifth through eighth TS packets indicates 'copy once,' and that of the ninth through twelfth TS packets indicates 'copy free.
  • FIG. 7 can be referred to for other details not described in FIG. 8.
  • Operation (A) is repeated for the second through fourth TS packets. Since usage rule information is created in operations (B) through (G), no additional usage rule information is created for the second through fourth TS packets.
  • the 'encryption_scheme' is set to an encryption algorithm assigned to the digital broadcast receiver, for example, AES-128-CBC in the present exemplary embodiment.
  • the 'sequence_start_packet_number' is set to, for example, TS#5.
  • the 'content_id' is set to, for example, B.
  • the 'content_id' is set to, for example, C.
  • (X) Operation (Q) is repeated for the tenth through twelfth TS packets. Since usage rule information is created in operations (R) through (W), no additional usage rule information is created for the tenth through twelfth TS packets. [98] (Y) The usage rule information created during operations (A) through (X) and the twelve TS packets are added, packaged, and then stored in a predetermined position of a recording medium of the digital broadcast receiver. [99] The operation of packaging broadcast contents when a copy control bit is CCI has been described with reference to FIG. 8. However, the same may be applied to a case where the copy control bit is a BF.
  • a case where the BF is off is similar to the case where the CCI is 'copy free' in FIG. 8, and a case where the BF is on is similar to the case where the CCI is 'copy once' in FIG. 8.
  • operations (C) and (S) when the BF is off, the 'EachStatus_BfCci' is set to 0x000 indicating the BF being off.
  • operation (K) when the BF is on, the
  • the present invention can also be implemented as computer-readable code on a computer-readable recording medium.
  • the computer-readable recording medium is any data storage device that can store data which can be thereafter read by a computer system. Examples of the computer-readable recording medium include read-only memory (ROM), random-access memory (RAM), CD-ROMs, magnetic tapes, floppy disks, optical data storage devices, and carrier waves (such as data transmission through the Internet).
  • the computer-readable recording medium can also be distributed over network- coupled computer systems so that the computer-readable code is stored and executed in a distributed fashion.
  • the present invention provides a method of packaging broadcast contents which prevents unauthorized copying of broadcast contents transmitted through a digital broadcast receiver.

Abstract

A method of packaging broadcast contents are provided. The method includes: extracting a copy control bit from input broadcast contents and determining whether the broadcast contents will be stored after being encrypted based on the extracted copy control bit; creating usage rule information which includes an encryption method of the broadcast contents if it is determined that the broadcast contents will be stored after being encrypted; extracting the copy control bit from each new broadcast content sequentially input and detecting broadcast contents which include copy control bits indicating that the broadcast contents will be stored without being encrypted; and encrypting the input broadcast contents through the broadcast contents before the detected broadcast contents using the encryption method and packaging and storing the encrypted broadcast contents and the usage rule information. Therefore, the unauthorized copying of broadcast contents transmitted through a digital broadcast receiver can be prevented.

Description

Description
METHOD OF PACKAGING BROADCAST CONTENTS
Technical Field
[1] Methods consistent with the present invention relate to packaging broadcast contents which prevents unauthorized copying of broadcast contents transmitted through a digital broadcast receiver and allows only a device having a corresponding content identification to play back the broadcast contents, thereby protecting the broadcast contents.
Background Art
[2] Recently, there has been a surge in the transmission of digital contents using various communications media, such as the Internet, terrestrial networks, cable networks and satellites, and in the sale and rental of digital contents using large- capacity recording media such as compact disks (CDs) and digital versatile discs (DVDs). Accordingly, digital rights management (DRM), which is a solution to protect copyrights of digital contents, is emerging as an important issue. Thus, DRM methods of providing authorized users of a domain with various contents using devices included in the domain are actively being investigated.
[3] Digital broadcast contents are transmitted from contents providers to users. Users are authorized to use digital broadcast contents only after they obtain the rights to use the digital broadcast contents. Thus, digital broadcast contents must be protected from unauthorized users.
[4] The U.S. Federal Communications Commission (FCC) is considering a requirement to add a one-bit broadcast flag (BF) to high definition (HD)-grade contents digitally broadcast within the U.S. to prohibit the indiscriminate redistribution of digital terrestrial broadcast programs. In other words, the FCC intends to promote the safe use of digital broadcast contents using a technology that prevents unauthorized users from using digital broadcast contents when a BF included in the digital broadcast contents is on.
[5] FIG. 1 is a conventional table showing operations which are allowed or not allowed according to a BF. Referring to FIG. 1, if a copy control bit included in broadcast contents is a BF, permission to store or copy the broadcast contents is given according to the type of the BF.
[6] More specifically, when the BF is off, storing and copying of the digital broadcast contents are permitted. When the BF is on, the broadcast contents can be stored only after being encrypted, and can or cannot be copied. In FIG. 1, 'O' indicates operations allowed and 'X' indicates operations not allowed.
[7] In 2005, the Open Cable standard is set to become the next-generation cable broadcast standard of the U.S. The Open Cable standard makes it compulsory to use copy control information (CCI) to control or restrict the storing or copying of contents received. CCI is two-bit control information which controls the copying of cable broadcast contents by indicating 'copy free' (00), 'copy once' (01), 'copy no more' (10), and 'copy never' (11).
[8] FIG. 2 is another conventional table showing operations which are allowed or not allowed according to CCI. Referring to FIG. 2, if a copy control bit included in broadcast contents is CCI, permission to store and/or copy the broadcast contents is given according to the type of the CCI.
[9] More specifically, when the CCI is 'copy free,' broadcast contents can be stored and copied. When the CCI is 'copy once,' the broadcast contents can only be stored. When the CCI is 'copy never,' it is not allowed to store the broadcast contents, and when the CCI is 'copy no more,' it is not allowed to copy the broadcast contents. When the CCI is 'copy free,' the broadcast contents can be stored without being encrypted, and when the CCI is 'copy once,' the broadcast contents can be stored after being encrypted. In FIG. 2, 'O' indicates operations which are allowed and 'X' indicates operations which are not allowed.
Disclosure of Invention
Technical Problem
[10] As described above, there is a growing need for restricting the unlimited storing and copying of digital broadcast contents. However, a mechanism for packaging and storing digital broadcast contents and information regarding rules for using digital broadcast contents has not been suggested.
Technical Solution
[11] The present invention provides a method of packaging broadcast contents which prevents unauthorized copying of broadcast contents transmitted through a digital broadcast receiver and allows only a device having a corresponding content identification to play back the broadcast contents, thereby protecting the broadcast contents.
Advantageous Effects
[12] According to the present invention, the unauthorized storing, copying, or redistribution of broadcast contents that are received through a digital broadcast receiver can be prevented using a BF or CCI included in the broadcast contents.
[13] In addition, since broadcast contents are packaged using a content identification which will be used as license information when the broadcast contents are decrypted, even if the broadcast contents were copied without authorization, the broadcast contents cannot be played back. Thus, the broadcast contents can be protected more securely.
Description of Drawing
[14] FIG. 1 is a conventional table showing operations which are allowed or not allowed according to a BF;
[15] FIG. 2 is another conventional table showing operations which are allowed or not allowed according to CCI;
[16] FIG. 3 is a flowchart illustrating a method of packaging broadcast contents according to an exemplary embodiment of the present invention;
[17] FIG. 4 is a flowchart illustrating a method of packaging broadcast contents according to another exemplary embodiment of the present invention;
[18] FIG. 5 is a flowchart illustrating a method of packaging broadcast contents according to another exemplary embodiment of the present invention;
[19] FIG. 6 is a flowchart illustrating a method of packaging broadcast contents according to another exemplary embodiment of the present invention;
[20] FIG. 7 illustrates an example of usage rule information according to an exemplary embodiment of the present invention; and
[21] FIG. 8 illustrates an operation of packaging broadcast contents based on CCI of
FIG. 7 according to an exemplary embodiment of the present invention.
Best Mode
[22] According to an aspect of the present invention, there is provided a method of packaging broadcast contents, the method including: (a) extracting a copy control bit from input broadcast contents and determining whether the broadcast contents will be stored after being encrypted based on the extracted copy control bit; (b) creating usage rule information which includes an encryption method of the broadcast contents if it is determined that the broadcast contents will be stored after being encrypted; (c) extracting the copy control bit from each new broadcast content sequentially input after operation (a) and detecting broadcast contents which comprise copy control bits indicating that the broadcast contents will be stored without being encrypted; and (d) encrypting the broadcast contents input in operation (a) through the broadcast contents before the broadcast contents detected in operation (c) using the encryption method and packaging and storing the encrypted broadcast contents and the usage rule information.
[23] According to another aspect of the present invention, there is provided a method of packaging broadcast contents, the method including: (a) extracting a copy control bit from input broadcast contents and determining whether the broadcast contents will be stored, and if stored, whether the broadcast contents will be stored after being encrypted based on the extracted copy control bit; (b) creating usage rule information which includes an encryption method of the broadcast contents if it is determined that the broadcast contents will be stored after being encrypted; (c) extracting the copy control bit from each new broadcast content sequentially input after operation (a) and detecting broadcast contents which comprise copy control bits indicating other than characteristics that the broadcast contents will be stored after being encrypted; and (d) encrypting the broadcast contents input in operation (a) through the broadcast contents detected in operation (c) using the encryption method and packaging and storing the encrypted broadcast contents and the usage rule information.
[24] According to another aspect of the present invention, there is provided a method of packaging broadcast contents, the method including: (a) extracting a copy control bit which indicates whether broadcast contents will be stored after being encrypted from each broadcast content sequentially input; (b) detecting whether characteristics of the extracted copy control bit are changed; (c) creating first usage rule information which comprises an encryption method of corresponding broadcast contents if the copy control bit indicates that the broadcast contents will be stored after being encrypted and creating second usage rule information indicating the absence of the encryption method if the copy control bit indicates that the broadcast contents will be stored without being encrypted; and (d) performing operations (a) through (c) on a predetermined number of broadcast contents, and packaging and storing first and second usage rule information created as a result of performing operations (a) through (c), broadcast contents encrypted using the encryption method included in the first usage rule information generated by the broadcast contents, and broadcast contents that generate the second usage rule information.
[25] According to another aspect of the present invention, there is provided a method of packaging broadcast contents, the method including: (a) extracting a copy control bit which indicates whether broadcast contents will be stored and if stored, whether the broadcast contents will be stored after being encrypted from each broadcast content sequentially input; (b) detecting whether characteristics of the extracted copy control bit are changed; (c) creating first usage rule information which comprises an encryption method of corresponding broadcast contents if the copy control bit indicates that the broadcast contents will be stored after being encrypted, creating second usage rule information indicating the absence of the encryption method if the copy control bit indicates that the broadcast contents will be stored without being encrypted, and eliminating the broadcast contents if the copy control bit indicates that the broadcast contents will not be stored; and (d) performing operations (a) through (c) on a predetermined number of broadcast contents, and packaging and storing usage rule information that comprises the first and second usage rule information created as a result of performing operations (a) through (c), broadcast contents encrypted using the encryption method included in the first usage rule information generated by the broadcast contents, and broadcast contents that generate the second usage rule information.
[26] According to another aspect of the present invention, there is provided a computer- readable recording medium on which programs for executing the methods is recorded.
Mode for Invention
[27] The present invention will now be described more fully with reference to the accompanying drawings, in which exemplary embodiments of the invention are shown. The invention may, however, be embodied in many different forms and should not be construed as being limited to the exemplary embodiments set forth therein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art.
[28] In the present invention, two models are used according to a source of contents. A first source of contents is local channels. Contents broadcast on local channels accompany a broadcast flag (BF) as a copy control bit, and the BF is either on or off.
[29] As described above, the U.S. FCC is considering adding a one-bit BF to high definition (HD)-grade contents digitally broadcast within the U.S. To protect digital broadcast contents, the FCC also endeavors to develop a digital broadcasting implementation technology standard, which prevents unauthorized users from using digital broadcast contents when the BF included in the digital broadcast contents is on.
[30] A second source of contents is cable channels. Copy control information (CCI) accompanies contents broadcast on cable channels. CCI includes ' copy free,' 'copy once,' 'copy no more,' and 'copy never.'
[31] The BF or CCI embedded in broadcast contents and thus detected is recreated in the form of usage rule information. In other words, usage rule information is created based on a BF or CCI included in broadcast contents and detected. Since a method of detecting a BF or CCI falls outside the scope of the present invention, its description will be omitted.
[32] FIG. 3 is a flowchart illustrating a method of packaging broadcast contents according to an exemplary embodiment of the present invention. The method is applied to a case where a copy control bit included in contents that are broadcast on a channel is a BF. Based on the copy control bit, it can be determined whether broadcast contents will be stored after being encrypted or without being encrypted.
[33] First, a copy control bit is extracted from input broadcast contents (S300). Based on the copy control bit extracted in operation S300, it is determined whether the broadcast contents will be stored after being encrypted (S310). If it is determined that the broadcast contents will be stored after being encrypted in operation S310, usage rule information that includes an encryption method of the broadcast contents is created (S320). The usage rule information further includes content identification information which will be used as license information when the broadcast contents are decrypted. The usage rule information will be described in more detail later with reference to FIG. 7.
[34] Next, a copy control bit is extracted from each new broadcast content sequentially input (S330). Then, it is determined whether broadcast contents including copy control bits indicating that the broadcast contents will be stored without being encrypted are detected (S340). If it is determined that the broadcast contents including copy control bits indicating that the broadcast contents will be stored without being encrypted are not detected, operation S330 is re-performed.
[35] If it is determined that the broadcast contents including copy control bits indicating that the broadcast contents will be stored without being encrypted are detected in operation S340, the broadcast contents including the copy control bits which indicate that the broadcast contents will be stored after being encrypted are encrypted using the encryption method included in the usage rule information created in operation S320 (S350).
[36] The broadcast contents encrypted in operation S350 and the usage rule information are packaged and stored (S360). Here, the usage rule information created in S320 may be packaged and stored in a file and placed before the broadcast contents input in operation S300.
[37] If it is determined that the broadcast contents will be stored without being encrypted in operation S310, usage rule information that includes information indicating the absence of the encryption method is created (S325). Next, a copy control bit is extracted from each new broadcast content sequentially input after operation S300 (S335).
[38] It is determined whether broadcast contents including copy control bits which indicate that the broadcast contents will be stored after being encrypted are detected (S345). If it is determined that the broadcast contents including copy control bits which indicate that the broadcast contents will be stored after being encrypted are not detected, operation S335 is re -performed.
[39] If it is determined that the broadcast contents including copy control bits which indicate that the broadcast contents will be stored after being encrypted are detected in operation S345, the broadcast contents including the copy control bits which indicate that the broadcast contents will be stored without being encrypted and the usage rule information are packaged and stored (S365). Here, the usage rule information created in S325 may be packaged and stored in a file and placed before the broadcast contents input in operation S300.
[40] FIG. 4 is a flowchart illustrating a method of packaging broadcast contents according to another exemplary embodiment of the present invention. The method is applied to a case where a copy control bit included in contents that are broadcast on a channel is CCI. Based on a copy control bit, it can be determined whether broadcast contents will be stored and, if stored, whether the broadcast contents will be stored after being encrypted or without being encrypted.
[41] First, a copy control bit is extracted from input broadcast contents (S400). Based on the copy control bit extracted in operation S400, it is determined whether the broadcast contents will be stored (S410). If it is determined that the broadcast contents will not be stored, the broadcast contents input in operation S400 are eliminated (S415).
[42] If it is determined that the broadcast contents will be stored in operation S410, it is determined whether the broadcast contents will be stored after being encrypted, based on the copy control bit extracted in operation S400 (S420). If it is determined that the broadcast contents will be stored after being encrypted, usage rule information that includes an encryption method of the broadcast contents is created (S430). The usage rule information further includes content identification information which will be used as license information when the broadcast contents are decrypted. The usage rule information will be described in more detail later with reference to FIG. 7.
[43] Next, a copy control bit is extracted from each new broadcast content sequentially input after operation S400 (S440). Then, it is determined whether broadcast contents which include copy control bits indicating characteristics other than the broadcast contents will be stored without being encrypted are detected (S450). If it is determined that the broadcast contents which include copy control bits indicating characteristics other than the broadcast contents will be stored without being encrypted are not detected, operation S440 is re -performed.
[44] If it is determined that the broadcast contents which include copy control bits indicating characteristics other than the broadcast contents will be stored without being encrypted in operation S450, the broadcast contents which include the copy control bits indicating other than the characteristics that the broadcast contents will be stored after being encrypted are encrypted using the encryption method which is included in the usage rule information created in operation S430 (S460).
[45] The broadcast contents encrypted in operation S430 and the usage rule information are packaged and stored (S470). Here, the usage rule information created in S430 may be packaged and stored in a file and placed before the broadcast contents input in operation S400.
[46] If it is determined that the broadcast contents will be stored without being encrypted in operation S420, usage rule information that includes information indicating the absence of the encryption method is created (S435). Next, a copy control bit is extracted from each new broadcast content sequentially input after operation S400 (S445).
[47] It is determined whether broadcast contents which include copy control bits indicating characteristics other than the broadcast contents will be stored without being encrypted are detected (S455). If it is determined that the broadcast contents which include copy control bits indicating characteristics other than the broadcast contents will be stored without being encrypted are not detected, operation S445 is re- performed.
[48] If it is determined that the broadcast contents which include copy control bits indicating characteristics other than the broadcast contents will be stored without being encrypted are detected in operation S455, the broadcast contents which include the copy control bits indicating that the broadcast contents will be stored without being encrypted and the usage rule information created in operation S435 are packaged and stored (S475). Here, the usage rule information created in S435 may be packaged and stored in a file and placed before the broadcast contents input in operation S400.
[49] FIG. 5 is a flowchart illustrating a method of packaging broadcast contents according to another exemplary embodiment of the present invention. The method is applied to a case where a copy control bit included in contents that are broadcast on a channel is a BF. Based on a copy control bit, it can be determined whether broadcast contents will be stored after being encrypted or without being encrypted.
[50] First, a copy control bit is extracted from each broadcast content sequentially input
(S500). It is determined whether characteristics of the copy control bit are changed in operation S500 (S510). If it is determined that the characteristics of the copy control bit remain unchanged, operation S500 is re-performed.
[51] If it is determined that the characteristics of the copy control bit are changed in operation S510, it is determined whether the changed characteristics of the copy control bit indicate that the broadcast contents will be stored after being encrypted (S520). If it is determined that the broadcast contents will be stored after being encrypted in operation S520, first usage rule information including an encryption method of the broadcast contents is created. Here, the first usage rule information further includes content identification information which will be used as license information when the broadcast contents are decrypted. The first usage rule information will be described in more detail later with reference to FIG. 7.
[52] Next, the broadcast contents are encrypted using the encryption method included in the first usage rule information created in operation S530 (S540). If it is determined that the broadcast contents will be stored without being encrypted in operation S520, second usage information that includes information indicating the absence of the encryption method is created (S535). The second usage rule information may further include content identification information. The second usage rule information will be described in more detail later with reference to FIG. 7.
[53] It is determined whether operations S500 through S535 or S540 are performed on a predetermined number of broadcast contents (S550). If it is determined that operations S500 through S535 or S540 are not performed on the predetermined number of broadcast contents, operation S500 is re-performed.
[54] If it is determined that operations S500 through S535 or S540 are performed on the predetermined number of broadcast contents in operation S550, at least one of the first and second usage rule information, and at least one of the broadcast contents that are encrypted in operation S530 and the broadcast contents that can be stored without being encrypted are packaged and stored (S560). Here, the first usage rule information and the second usage rule information may be packaged and stored in one file and placed before the encrypted and unencrypted broadcast contents.
[55] FIG. 6 is a flowchart illustrating a method of packaging broadcast contents according to another exemplary embodiment of the present invention. First, a copy control bit indicating whether broadcast contents will be stored and whether the broadcast contents will be stored after being encrypted is extracted from each broadcast content sequentially input (S600).
[56] It is determined whether characteristics of the copy control bit are changed in operation S600 (S610). If it is determined that the characteristics of the copy control bit remain unchanged, operation S 600 is re-performed.
[57] If it is determined that the characteristics of the copy control bit are changed in operation S610, it is determined whether the changed characteristics of the copy control bits indicate that the broadcast contents will be stored (S620). If it is determined that the broadcast contents will not be stored, the broadcast contents are eliminated (S625).
[58] If it is determined that the broadcast contents will be stored in operation S620, it is determined whether the changed characteristics of the copy control bit indicate that the broadcast contents will be stored after being encrypted (S630). If it is determined that the broadcast contents will be stored after being encrypted in S630, first usage rule information including an encryption method of the broadcast contents is created (S640). Here, the first usage rule information further includes content identification information which will be used as license information when the broadcast contents are decrypted. The first usage rule information will be described in more detail later with reference to FIG. 7.
[59] Next, the broadcast contents are encrypted using the encryption method included in the first usage rule information created in operation S640 (S650). If it is determined that the broadcast contents will be stored without being encrypted in operation S630, second usage information that includes information indicating the absence of the encryption method is created (S645). The second usage rule information may further include content identification information. The second usage rule information will be described in more detail later with reference to FIG. 7.
[60] It is determined whether operations S600 through S645 or S650 are performed on a predetermined number of broadcast contents (S660). If it is determined that operations S600 through S645 or S650 are not performed on the predetermined number of broadcast contents in operation S660, operation S600 is re-performed.
[61] If it is determined that operations S600 through S645 or S650 are performed on the predetermined number of broadcast contents in operation S660, at least one of the first and second usage rule information transmitted in operation S660, and at least one of the broadcast contents encrypted in operation S650 and the broadcast contents that can be stored without being encrypted are packaged and stored (S670). Here, the first usage rule information and the second usage rule information may be packaged and stored in one file and placed before the encrypted and unencrypted broadcast contents.
[62] FIG. 7 illustrates usage rule information created using the methods of packaging broadcast contents of FIGS. 3 through 6 according to an exemplary embodiment of the present invention. Referring to FIG. 7, a digital broadcasting receiver receives broadcast contents composed of 188-byte transport stream (TS) packets. The digital broadcasting receiver also receives a four-byte arrival time stamp, which is a counter value for arranging the TS packets received.
[63] Usage rule information indicates whether a 188-byte TS packet will be stored and, if stored, whether the 188-byte TS packet will be stored after being encrypted. The usage rule information is placed before the 188-byte TS packet and includes a 'magic_number,' a 'size_of_UsageRuleInformation,' a 'num_of- sequences,' a 'sequence_start_packet_number,' and a 'SequenceUsageRulelnformation.'
[64] The 'magic_number' is a grammar indicating the start of a 'UsageRulelnformation'.
The 'size_of_UsageRuleInformation' indicates the entire size of the 'UsageRulelnformation' including the 'magic_number'.
[65] The 'num_ of_sequences' is a flag indicating how many packet sequences are included in broadcast contents. A packet sequence starts anew when a 'usagerule_information' is changed. In other words, in the case of cable contents, when CCI changes, the 'num_of_sequences' increases. In the case of BF contents, when a BF changes, the 'num_of_sequences' increases.
[66] The 'sequence_start_packet_number' indicates a starting number of packet sequences.
[67] A 'SequenceUsageRulelnformation' includes an 'is_encrypted,' an
'EachStatus_BfCci,' an 'encryption_scheme,' an 'encryption_parameters,' a 'content_id,' and a 'Detailedlnformation.' [68] The 'is_encrypted' indicates whether a packet sequence is encrypted. For example, the 'is_encrypted' may include 1 bit and may be set to 0x1 indicating 'encryption' and 0x0 indicating 'non-encryption.'
[69] The 'EachStatus_BfCci' indicates a BF or CCI. For example, the 'EachStatus_BfCci' may include 3 bits and may be set to 0x000 indicating 'BF off,' to 0x001 indicating 'BF on,' to 0x010 indicating 'copy free,' to 0x011 indicating 'copy once,' to 0x100 indicating 'copy no more,' and to 0x101 indicating 'copy never.' The 'encryption_scheme' indicates encryption schemes such as AES-128-CBC and AES- 128-CTR. For example, the 'encryption_scheme' may include 4 bits.
[70] The 'encryption_parameters' indicates parameter values used for decryption. For example, the 'encryption_parameters' may include 8 bits. The 'content_id' is a unique value assigned to each content and used when content identification for a corresponding content is required like a licence.
[71] The 'Detaillnformation' may include title and duration. Title indicates the title of a packet sequence, and duration indicates the duration of the packet sequence.
[72] FIG. 7 illustrates only an example of usage rule information according to an exemplary embodiment of the present invention. Thus, terms and their descriptions illustrated in FIG. 7 must not be limited thereto.
[73] FIG. 8 illustrates an operation of packaging broadcast contents based on the CCI of
FIG. 7 according to an exemplary embodiment of the present invention. FIG. 8 illustrates a case where a digital broadcast receiver is currently receiving cable broadcast contents. Also, in FIG. 8, a program includes twelve 188-byte TS packets. The CCI of the first through fourth TS packets indicates 'copy free,' that of the fifth through eighth TS packets indicates 'copy once,' and that of the ninth through twelfth TS packets indicates 'copy free.' FIG. 7 can be referred to for other details not described in FIG. 8.
[74] (A) A 4-byte arrival time stamp is attached to the first 188-byte TS packet to form a
192-byte packet.
[75] (B) Since the CCI of the first TS packet is 'copy free,' the 'num_of_sequences' is set to 1. Furthermore, since no encryption is performed, the 'is_encrypted' is set to 0x0.
[76] (C) The 'EachStatus_BfCci' is set to 0x010 indicating 'copy free.'
[77] (D) The 'encryption_scheme' is set to NONE since encryption is not performed.
[78] (E) The 'sequence_start_packet_number' is set to, for example, TS#1.
[79] (F) The 'content_id' is set to, for example, A.
[80] (G) Title and duration are set.
[81] (H) Operation (A) is repeated for the second through fourth TS packets. Since usage rule information is created in operations (B) through (G), no additional usage rule information is created for the second through fourth TS packets.
[82] (I) A 4-byte arrival time stamp is attached to the fifth 188-byte TS packet to form a 192-byte packet. [83] (J) Since the CCI of the fifth TS packet is 'copy once,' the 'num_of_sequences' is set to 2, the fifth TS packet is encrypted, and the 'is_encrypted' is set to 0x1. [84] (K) The 'EachStatus_BfCci' is set to 0x100 indicating 'copy no more.'
[85] (L) The 'encryption_scheme' is set to an encryption algorithm assigned to the digital broadcast receiver, for example, AES-128-CBC in the present exemplary embodiment.
Then, the 'encryption_parameters' is set.
[86] (M) The 'sequence_start_packet_number' is set to, for example, TS#5.
[87] (N) The 'content_id' is set to, for example, B.
[88] (O) Title and duration are set.
[89] (P) Operation (I) is repeated for the sixth through eighth TS packets. Since usage rule information is created in operations (J) through (O), no additional usage rule information is created for the sixth through eighth TS packets. [90] (Q) A 4-byte arrival time stamp is attached to the ninth 188-byte TS packet to form a 192-byte packet. [91] (R) Since the CCI of the ninth TS packet is 'copy free,' which is changed from 'copy once,' the 'num_of_sequences' is set to 3 and the 'is_encrypted' is set to 0x0. [92] (S) The 'EachStatus_BfCci' is set to 0x010 indicating 'copy free.'
[93] (T) The 'encryption_scheme' is set to NONE since no encryption is performed. The
'encryption_parameters' is not set since the 'encryption_scheme' is absent. [94] (U) The 'sequence_start_packet_number' is set to, for example, TS#9.
[95] (V) The 'content_id' is set to, for example, C.
[96] (W) Title and duration are set.
[97] (X) Operation (Q) is repeated for the tenth through twelfth TS packets. Since usage rule information is created in operations (R) through (W), no additional usage rule information is created for the tenth through twelfth TS packets. [98] (Y) The usage rule information created during operations (A) through (X) and the twelve TS packets are added, packaged, and then stored in a predetermined position of a recording medium of the digital broadcast receiver. [99] The operation of packaging broadcast contents when a copy control bit is CCI has been described with reference to FIG. 8. However, the same may be applied to a case where the copy control bit is a BF. In other words, a case where the BF is off is similar to the case where the CCI is 'copy free' in FIG. 8, and a case where the BF is on is similar to the case where the CCI is 'copy once' in FIG. 8. [100] In operations (C) and (S), when the BF is off, the 'EachStatus_BfCci' is set to 0x000 indicating the BF being off. In operation (K), when the BF is on, the
'EachStatus_BfCci' is set to 0x001 indicating the BF being on. [101] The present invention can also be implemented as computer-readable code on a computer-readable recording medium. The computer-readable recording medium is any data storage device that can store data which can be thereafter read by a computer system. Examples of the computer-readable recording medium include read-only memory (ROM), random-access memory (RAM), CD-ROMs, magnetic tapes, floppy disks, optical data storage devices, and carrier waves (such as data transmission through the Internet).
[102] The computer-readable recording medium can also be distributed over network- coupled computer systems so that the computer-readable code is stored and executed in a distributed fashion.
[103] While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims.
Industrial Applicability
[104] The present invention provides a method of packaging broadcast contents which prevents unauthorized copying of broadcast contents transmitted through a digital broadcast receiver.

Claims

Claims
[1] L A method of packaging broadcast contents, the method comprising:
(a) extracting a copy control bit from first broadcast contents which are input and determining whether the first broadcast contents are to be encrypted before being stored based on the extracted copy control bit;
(b) if it is determined in operation (a) that the first broadcast contents are to be encrypted before being stored, creating first usage rule information which comprises an encryption method, extracting the copy control bit from each of second broadcast contents which are sequentially input after the first broadcast contents, and determining whether each of the second broadcast contents is not to be encrypted before being stored based on the extracted copy control bit; and
(c) if it is determined in operation (b) that one of the second broadcast contents is not to be encrypted before being stored, encrypting the first and second broadcast contents which include the copy control bit indicating that the first and second broadcast contents are to be encrypted before being stored, using the encryption method, and packaging and storing the encrypted first and second broadcast contents and the first usage rule information.
2. The method of claim 1, further comprising:
(b') if it is determined in operation (a) that the first broadcast contents are not be to encrypted before being stored, creating second usage rule information that comprises information indicating an absence of the encryption method, extracting the copy control bit from each of the second broadcast contents which are sequentially input after the first broadcast contents and determining whether each of the second broadcast contents is to be encrypted before being be stored based on the extracted copy control bit ; and
(c') if it is determined that one of the second broadcast contents is to be encrypted before being stored, packaging and storing the first and second broadcast contents which include the copy control bit indicating that the first and second broadcast contents are not be encrypted before being stored, and the second usage rule information.
3. The method of claim 2, wherein the first and second broadcast contents are digital terrestrial broadcast contents and the copy control bit is a broadcast flag.
4. The method of claim 2, wherein in operation (d) or (d'), the first or second usage rule information is packaged and stored in a file and placed before the first broadcast contents input in operation (a).
5. The method of claim 2, further comprising assigning a serial number to each of the first and second broadcast contents sequentially input, wherein each of the first and second usage rule information further comprises a serial number assigned to the first broadcast contents input in operation (a).
6. The method of claim 2, further comprising assigning an arrival time stamp to each of the first and second broadcast contents sequentially input, wherein each of the first and second usage rule information further comprises an arrival time stamp assigned to the first broadcast contents input in operation (a).
7. The method of claim 2, wherein each of the first and second usage rule information further comprises content identification information which will be used as license information when the first and second broadcast contents are decrypted.
8. A method of packaging broadcast contents, the method comprising:
(a) extracting a copy control bit from first broadcast contents which are input and determining whether the first broadcast contents will be stored based on the extracted copy control bit, and if it is determined that the first broadcast contents will be stored, whether the first broadcast contents are to be encrypted before being stored based on the extracted copy control bit;
(b) if it is determined that the broadcast contents are to be encrypted before being stored, creating first usage rule information which comprises an encryption method, extracting the copy control bit from each of second broadcast contents sequentially input after the first broadcast contents, and determining whether the copy control bit indicates characteristics other than the second broadcast contents are to be encrypted before being stored; and
(c) if it is determined in operation (b) that the copy control bit indicates characteristics other than the second broadcast contents are to be encrypted before being stored, encrypting the first and second broadcast contents including copy control bits indicating the first and second broadcast contents are to be encrypted before being stored using the first encryption method, and packaging and storing the encrypted first and second broadcast contents and the first usage rule information.
9. The method of claim 8, further comprising:
(b') if it is determined that the broadcast contents are not to be encrypted before being stored, creating second usage rule information that comprises information indicating an absence of the encryption method, extracting the copy control bit from each of the second broadcast contents sequentially input the first broadcast contents and determining whether the copy control bit indicates characteristics other than the broadcast contents are not to be encrypted before being stored; and (c') if it determined in operation (b) that the copy control bit indicates characteristics other than the second broadcast contents are to be encrypted before being stored, packaging the first and second broadcast contents which include copy control bits indicating the first and second broadcast contents are not to be encrypted before being stored and the second usage rule information, and storing the first and second broadcast contents and the second usage rule information which are packaged in a recording medium.
10. The method of claim 9, wherein the first and second broadcast contents are digital terrestrial broadcast contents and the copy control bit is copy control information.
11. The method of claim 9, wherein in operation (d) or (d'), the first or second usage rule information is packaged and stored in a file and placed before the first broadcast contents input in operation (a).
12. The method of claim 9, further comprising assigning a serial number to each of the first and second broadcast contents sequentially input, wherein each of the first and second usage rule information further comprises a serial number assigned to the first broadcast contents input in operation (a).
13. The method of claim 9, further comprising assigning an arrival time stamp to each of the first and second broadcast contents sequentially input, wherein each of the first and second usage rule information further comprises an arrival time stamp assigned to the first broadcast contents input in operation (a).
14. The method of claim 9, wherein each of the first and second usage rule information further comprises content identification information which will be used as license information when the first and second broadcast contents are decrypted.
15. The method of claim 8, further comprising eliminating the first broadcast contents if it is determined that the first broadcast contents will not be stored.
16. A method of packaging broadcast contents, the method comprising:
(a) extracting a copy control bit which indicates whether broadcast contents are to be encrypted before being stored from each broadcast content sequentially input;
(b) detecting whether characteristics of the extracted copy control bit are changed;
(c) creating first usage rule information which comprises an encryption method of corresponding broadcast contents if the copy control bit indicates that the broadcast contents are to be encrypted before being stored, and creating second usage rule information indicating an absence of the encryption method if the copy control bit indicates that the broadcast contents are not to be encrypted before being stored; and
(d) performing operations (a) through (c) on a predetermined number of broadcast contents, and packaging and storing at least one of the first and second usage rule information, and at least one of broadcast contents encrypted using the encryption method and broadcast contents which include the copy control bit indicating that the broadcast contents are not to be encrypted before being stored.
17. The method of claim 16, wherein in operation (d), usage rule information that comprises at least one of the first usage rule information and the second usage rule information is packaged and stored in a file and placed before first broadcast contents of the broadcast contents sequentially input in operation (a).
18. The method of claim 16, wherein in operation (d), the predetermined number of broadcast contents are input within a range set by a user.
19. The method of claim 18, wherein at least one of the first and second usage rule information created is packaged and stored in a file and placed before first broadcast contents of the broadcast contents sequentially input in operation (a).
20. The method of claim 16, wherein the broadcast contents are digital terrestrial broadcast contents and the copy control bit is a broadcast flag.
21. The method of claim 16, further comprising assigning a serial number to each of the broadcast contents sequentially input, wherein each of the first and second usage rule information further comprises a serial number assigned to the broadcast contents.
22. The method of claim 16, further comprising assigning an arrival time stamp to each of the broadcast contents sequentially input, wherein each of the first and second usage rule information further comprises an arrival time stamp assigned to the broadcast contents comprising the detected copy control bit.
23. The method of claim 16, wherein each of the first and second usage rule information further comprises content identification information which will be used as license information when the broadcast contents are decrypted.
24. The method of claim 16, wherein the first usage rule information comprises different encryption methods.
25. A method of packaging broadcast contents, the method comprising:
(a) extracting a copy control bit which indicates whether broadcast contents are to be stored and whether the broadcast contents are to be encrypted before being stored, from each broadcast content sequentially input;
(b) detecting whether characteristics of the extracted copy control bit are changed;
(c) creating first usage rule information which comprises an encryption method of corresponding broadcast contents if the copy control bit indicates that the broadcast contents are to be encrypted before being stored, creating second usage rule information indicating an absence of the encryption method if the copy control bit indicates that the broadcast contents are not to be encrypted before being stored, and eliminating the broadcast contents if the copy control bit indicates that the broadcast contents are not be stored; and (d) performing operations (a) through (c) on a predetermined number of broadcast contents, and packaging and storing usage rule information that comprises at least one of the first and second usage rule information, and at least one of broadcast contents encrypted using the encryption method and broadcast contents which include the copy control bit indicating that the broadcast contents are not to be encrypted before being stored.
26. The method of claim 25, wherein in operation (d), usage rule information that comprises at least one of the first usage rule information and the second usage rule information is packaged and stored in a file and placed before first broadcast contents of the broadcast contents sequentially input in operation (a).
27. The method of claim 25, wherein in operation (d), the predetermined number of broadcast contents are input within a range set by a user.
28. The method of claim 27, wherein at least one of the first and second usage rule information created is packaged and stored in a file and placed before first broadcast contents of the broadcast contents sequentially input in operation (a).
29. The method of claim 25, wherein the broadcast contents are digital terrestrial broadcast contents and the copy control bit is copy control information.
30. The method of claim 25, further comprising assigning a serial number to each of the broadcast contents sequentially input, wherein each of the first and second usage rule information further comprises a serial number assigned to the broadcast contents.
31. The method of claim 25, further comprising assigning an arrival time stamp to each of the broadcast contents sequentially input, wherein each of the first and second usage rule information further comprises an arrival time stamp assigned to the broadcast contents.
32. The method of claim 25, wherein each of the first and second usage rule information further comprises content identification information which will be used as license information when the broadcast contents are decrypted.
33. The method of claim 25, wherein the first usage rule information comprises different encryption methods.
34. A computer-readable recording medium on which a program is recorded for executing a method of packaging broadcast contents, the method comprising:
(a) extracting a copy control bit from first broadcast contents which are input and determining whether the first broadcast contents are to be encrypted before being stored based on the extracted copy control bit; (b) if it is determined in operation (a) that the first broadcast contents are to be encrypted before being stored, creating first usage rule information which comprises an encryption method, extracting the copy control bit from each of second broadcast contents which are sequentially input after the first broadcast contents, and determining whether each of the second broadcast contents is not to be encrypted before being stored based on the extracted copy control bit; and
(c) if it is determined in operation (b) that one of the second broadcast contents is not to be encrypted before being stored, encrypting the first and second broadcast contents which include the copy control bit indicating that the first and second broadcast contents are to be encrypted before being stored, using the encryption method, and packaging and storing the encrypted first and second broadcast contents and the first usage rule information.
35. A computer-readable recording medium on which a program is recorded for executing a method of packaging broadcast contents, the method comprising:
(a) extracting a copy control bit from first broadcast contents which are input and determining whether the first broadcast contents will be stored based on the extracted copy control bit, and if it is determined that the first broadcast contents will be stored, whether the first broadcast contents are to be encrypted before being stored based on the extracted copy control bit;
(b) if it is determined that the broadcast contents are to be encrypted before being stored, creating first usage rule information which comprises an encryption method, extracting the copy control bit from each of second broadcast contents sequentially input after the first broadcast contents, and determining whether the copy control bit indicates characteristics other than the second broadcast contents are to be encrypted before being stored; and
(c) if it is determined in operation (b) that the copy control bit indicates characteristics other than the second broadcast contents are to be encrypted before being stored, encrypting the first and second broadcast contents including copy control bits indicating the first and second broadcast contents are to be encrypted before being stored using the first encryption method, and packaging and storing the encrypted first and second broadcast contents and the first usage rule information.
36. A computer-readable recording medium on which a program is recorded for executing a method of packaging broadcast contents, the method comprising:
(a) extracting a copy control bit which indicates whether broadcast contents are to be encrypted before being stored from each broadcast content sequentially input;
(b) detecting whether characteristics of the extracted copy control bit are changed;
(c) creating first usage rule information which comprises an encryption method of corresponding broadcast contents if the copy control bit indicates that the broadcast contents are to be encrypted before being stored, and creating second usage rule information indicating an absence of the encryption method if the copy control bit indicates that the broadcast contents are not to be encrypted before being stored; and
(d) performing operations (a) through (c) on a predetermined number of broadcast contents, and packaging and storing at least one of the first and second usage rule information, and at least one of broadcast contents encrypted using the encryption method and broadcast contents which include the copy control bit indicating that the broadcast contents are not to be encrypted before being stored.
37. A computer-readable recording medium on which a program is recorded for executing a method of packaging broadcast contents, the method comprising:
(a) extracting a copy control bit which indicates whether broadcast contents are to be stored and whether the broadcast contents are to be encrypted before being stored, from each broadcast content sequentially input;
(b) detecting whether characteristics of the extracted copy control bit are changed;
(c) creating first usage rule information which comprises an encryption method of corresponding broadcast contents if the copy control bit indicates that the broadcast contents are to be encrypted before being stored, creating second usage rule information indicating an absence of the encryption method if the copy control bit indicates that the broadcast contents are not to be encrypted before being stored, and eliminating the broadcast contents if the copy control bit indicates that the broadcast contents are not be stored; and
(d) performing operations (a) through (c) on a predetermined number of broadcast contents, and packaging and storing usage rule information that comprises at least one of the first and second usage rule information, and at least one of broadcast contents encrypted using the encryption method and broadcast contents which include the copy control bit indicating that the broadcast contents are not to be encrypted before being stored.
EP06747357A 2005-04-13 2006-04-13 Method of packaging broadcast contents Ceased EP1869881A4 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US67069905P 2005-04-13 2005-04-13
KR1020050062124A KR100823256B1 (en) 2005-04-13 2005-07-11 Method for packaging of broadcast content
PCT/KR2006/001362 WO2006110001A1 (en) 2005-04-13 2006-04-13 Method of packaging broadcast contents

Publications (2)

Publication Number Publication Date
EP1869881A1 true EP1869881A1 (en) 2007-12-26
EP1869881A4 EP1869881A4 (en) 2010-12-08

Family

ID=37087242

Family Applications (1)

Application Number Title Priority Date Filing Date
EP06747357A Ceased EP1869881A4 (en) 2005-04-13 2006-04-13 Method of packaging broadcast contents

Country Status (2)

Country Link
EP (1) EP1869881A4 (en)
WO (1) WO2006110001A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0716544A2 (en) * 1994-12-08 1996-06-12 Lg Electronics Inc. Copy prevention method and apparatus of a digital magnetic recording/reproduction system
EP0924930A2 (en) * 1997-12-15 1999-06-23 Hitachi, Ltd. A digital information recording apparatus with copyright protection
EP0959467A2 (en) * 1998-05-20 1999-11-24 Sony Corporation Information processing apparatus, information processing methods and presentation media
US20030077074A1 (en) * 2000-12-13 2003-04-24 Hiroo Okamoto Digital information recording apparatus, reproducing apparatus and transmitting apparatus
US20030175013A1 (en) * 2001-07-13 2003-09-18 Motoki Kato Video information recording apparatus and reproducing apparatus
EP1471521A1 (en) * 2002-01-28 2004-10-27 Sony Corporation Information recording apparatus and method, and information reproduction apparatus and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR0166923B1 (en) * 1995-09-18 1999-03-20 구자홍 Method and apparatus of preventing an illegal watching and copying in a digital broadcasting system
ID22715A (en) * 1998-03-09 1999-12-09 Matsushita Electric Ind Co Ltd DIGITAL BROADCAST RECIPIENTS
JPH11339374A (en) * 1998-05-26 1999-12-10 Yamaha Corp Digital recording device
KR100605825B1 (en) * 1999-09-14 2006-07-31 삼성전자주식회사 A copy protection apparatus and method of a broadcast receiving system having a hdd

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0716544A2 (en) * 1994-12-08 1996-06-12 Lg Electronics Inc. Copy prevention method and apparatus of a digital magnetic recording/reproduction system
EP0924930A2 (en) * 1997-12-15 1999-06-23 Hitachi, Ltd. A digital information recording apparatus with copyright protection
EP0959467A2 (en) * 1998-05-20 1999-11-24 Sony Corporation Information processing apparatus, information processing methods and presentation media
US20030077074A1 (en) * 2000-12-13 2003-04-24 Hiroo Okamoto Digital information recording apparatus, reproducing apparatus and transmitting apparatus
US20030175013A1 (en) * 2001-07-13 2003-09-18 Motoki Kato Video information recording apparatus and reproducing apparatus
EP1471521A1 (en) * 2002-01-28 2004-10-27 Sony Corporation Information recording apparatus and method, and information reproduction apparatus and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2006110001A1 *

Also Published As

Publication number Publication date
EP1869881A4 (en) 2010-12-08
WO2006110001A1 (en) 2006-10-19

Similar Documents

Publication Publication Date Title
KR101058044B1 (en) Medium on which computer program which processes content which consists of a plural of contents parts is recorded
JP4798935B2 (en) Content security method for providing renewable security over a long period of time, apparatus and computer-readable storage medium
US7065216B1 (en) Methods and systems of protecting digital content
US7549063B2 (en) Methods and systems of protecting digital content
KR101044949B1 (en) Method and apparatus for generating license
JP5355554B2 (en) Updating encryption key data
KR100846787B1 (en) Method and apparatus for importing transport stream
KR20010006933A (en) Method and apparatus for preventing illegal usage of multimedia content
US20100138934A1 (en) Information processor
US8005758B2 (en) Encryption/decryption method and apparatus for controlling content use based on license information
US8571209B2 (en) Recording keys in a broadcast-encryption-based system
JP2004532495A5 (en)
BRPI0617419A2 (en) renewable traitor tracking
US8301571B2 (en) Method of packaging broadcast contents
EP1045386B1 (en) Method and apparatus for preventing illegal use of multimedia content
US20060253401A1 (en) Method and apparatus for efficiently encrypting/decrypting digital content according to broadcast encryption scheme
JP5111862B2 (en) Method and apparatus for reimporting content
EP1869881A1 (en) Method of packaging broadcast contents
US8391481B2 (en) Rebinding of content title keys in clusters of devices with distinct security levels
MXPA00003641A (en) Method and apparatus for preventing illegal use of multimedia content

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20070817

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): DE FR GB IT

DAX Request for extension of the european patent (deleted)
RBV Designated contracting states (corrected)

Designated state(s): DE FR GB IT

A4 Supplementary search report drawn up and despatched

Effective date: 20101108

RIC1 Information provided on ipc code assigned before grant

Ipc: H04N 7/167 20060101AFI20061106BHEP

Ipc: G11B 20/00 20060101ALI20101102BHEP

Ipc: H04N 5/91 20060101ALI20101102BHEP

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SAMSUNG ELECTRONICS CO., LTD.

17Q First examination report despatched

Effective date: 20131204

APBK Appeal reference recorded

Free format text: ORIGINAL CODE: EPIDOSNREFNE

APBN Date of receipt of notice of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNNOA2E

APBR Date of receipt of statement of grounds of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNNOA3E

APAF Appeal reference modified

Free format text: ORIGINAL CODE: EPIDOSCREFNE

REG Reference to a national code

Ref country code: DE

Ref legal event code: R003

APBT Appeal procedure closed

Free format text: ORIGINAL CODE: EPIDOSNNOA9E

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20200601