515215 Α7 Β7 五、發明說明(1 ) 本發明爲在管理系統和用戶解碼器之間,解密資訊( data )傳送的系統與過程。 付費電視用戶的解碼器能處理有線或無線電視的訊號 ’這些信號是類比或是數位的。 不管是音頻信號,影像信號或是控制信號,這些信號 都不同。 後者包含了管理訊息(稱爲Ε Μ Μ訊息),也就是說 ,此訊息能直接控制一個解碼器或是一組解碼器,而控制 訊息(稱爲E C Μ訊息),也就是說,此訊息含有在其他 人間的授權訊息,能夠將傳送中的訊號解密。 在本申請書中,我們提到預定音頻或影像信號的解密 授權訊息(E C Μ )。 對於付費電視的用戶,包括每個頻道都根據一個或更 多特殊的鍵加密的用戶提供建議,這是必須的,因爲事實 上,用戶會爲了 一個頻道但沒有權利去利用其他頻道而付 費。 授權訊息(E C Μ )用特殊鍵加密,以適合管理系統 ,用戶的解碼器包含有保全的密碼組件,能解譯那些訊息 ,爲了保密的理由,解密的信號(音頻或影像)的授權訊 息被週期性的更改,管理系統傳送這些加密的訊息( E C Μ )到密碼組件,此密碼組件能解譯這些訊息,管理 授權及根據用戶權利傳送給解碼器需要解密音頻或影像信 號的資訊。 經由密碼組件解密的結果稱爲''控制字元〃,簡稱'' 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -4 - (請先閱讀背面之注意事項再填寫本頁) I -------訂--------I ' ▼ I I · 經濟部智慧財產局員工消費合作社印製 515215 Α7 Β7 五、發明說明(2 ) C W 〃 ,此控制字元有益於解碼器及用戶有完整的傳送訊 息。 如上所述,這些控制字元定期的改變,只爲了要防止 非法接收節目者藉著運算功能強的電腦計算出控制字元, 而能享受免費的付費服務,這就是爲什麼控制字元要定期 的改變,週期通常爲1到2 0秒,此週期稱爲密碼週期。 授權訊息(E C Μ )用比密碼週期較高的頻率傳送, 例如每1 0 0毫秒,開始解碼器服務時及改變頻道時是不 可獲缺的。 事實上,能夠是要看到傳送的節目,控制字元對加密 的信號來說是必要的,在螢幕前等五秒鐘,只爲了看淸楚 畫面,這樣並不好。 在第二個例子中,每個頻道有控制字元,用戶應該等 待密碼週期的結束,去接收解譯新頻道訊號的授權訊息, 與之前的狀況同樣,用戶無法接受改變頻道時,幾秒鐘的 延遲。 實際上,這也是爲什麼授權訊息(E C Μ )要被傳送 5到2 0之間的頻率。 當改變頻道時,在用戶指定與看見頻道影像的時間必 須是兩者之中較短的,根據一般的標準,持續大約5 〇 〇 毫秒還可以被接受。 在時間推移中,接下來的步驟如下: •在新的頻道分配音頻,影像或控制濾波器; •等待下個含有前述頻道解密控制字元的訊息( 本紙張尺度適用中國國家標準(CNS)A4規格(2】〇 χ 297公釐) -5 - (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 -1 I I n ϋ n ϋ .1 一OJ· ·ϋ n n I I I a— _1 ϋ «ϋ ϋ ϋ ϋ n ϋ ϋ ϋ ϋ ^1 ϋ n 1 I ϋ ·1 ϋ n < 515215 Α7 ___ Β7 五、發明說明(3 ) E C Μ ); •接收訊息(E C Μ )及傳送給密碼組件解譯; •藉由密碼組件執行解密演算法,並回傳解密的控制 字元給解碼器; •開始Μ P E G解壓縮,並等待一個影像同步完成。 藉由這一連串的動作,並不能平行的完成,也就是說 ’就改變頻道而言,每個動作都要決定最大的時間。 就已知高保全的加密演算法,越需要演算的,花的時 間越多,一方面來說,解密的時間直接算在頻道間變換的 時間,不能被延長來增進加密的品質,這也就是爲什麼用 演算法的保全得到的控制字元,是被限制的時間來強制限 制。 習知的方法在歐洲專利文件第〇 5 8 3 2 0 2號提到 ,並持續著,所以在選定的頻道,不只是有關頻道的授權 訊息(E C Μ ),還有其他的頻道授權訊息,後者以低頻 傳送,以防傳送壅塞。 這種方法缺點在於用不需要的訊息塞滿了頻道,並且 記住需要所有授權訊息,爲了改變頻道時使用,根據此文 件中另一個未解決的觀點,在於增加品質的解密演算,不 應該增加頻道間轉換的時間。 本發明物的範圍是建議一個方法與加密訊息的傳送系 統,此傳送系統保證高保全,以達到解碼器控制字元的目 的。 這個範圍完全地使用控制字元,此控制字元結合了每 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 I — — — — — — — ^ . I — — — — — — — I — — — — — — — — — —--I _ . -6- 515215 A7 B7 五、發明說明(4 ) 個頻道授權訊息(E C Μ )的解密,與通常是一組頻道授 權訊息的解密。 在以下的敘述中,每個頻道的訊息稱爲''單頻道授權 訊息(E C Μ ) 〃 ,而常見的一組訊息稱爲''多頻道授權 訊息(Μ E C Μ ) 〃 ( Master ECM )。 處理訊息(E C Μ )的演算法,屬於快速並提供有限 保全的那一型,這樣可以利用頻道轉換時的一點點時間。 另一方面來說,如本發明,不可能只處理單頻道授權 訊息(E C Μ )就得到控制字元(C W ),能夠解譯單頻 道授權訊息(E C Μ )的密碼組件,必須有相當於在多頻 道授權訊息(Μ E C Μ )中收到的訊息。後者藉由一個稱 爲系統的鑰匙解密,因爲從不同的頻道來說它是獨立的。 改變或是傳送頻道時,適合新頻道的資訊包含在單頻 道授權訊息(E C Μ )中,結合了已經在密碼組件裡的多 頻道授權訊息(Μ E C Μ ),後者通常是兩個頻道’用這 種方法,訊息(Μ E C Μ )解密的時間並不會影響到前述 傳送時間的計算,因此,解密訊息(Μ E C Μ )的演算法 較好,也就是說,需要較長的時間,但沒有因此不利於傳 送時間,再者,簡單的使用不同的演算法,增加了系統的 保全,多頻道授權訊息(Μ E C Μ )的內容能根據所有的 週期改變,此週期與訊息(E C Μ )(密碼時間)相等, 或是根據週期相乘。 如果在兩個單頻道授權訊息(E C Μ )間的時間是重 要的,既然它直接介入兩個頻道間傳送時間最大値的計算 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公~ (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 d--------訂---------線,·-------------- 經濟部智慧財產局員工消費合作社印製 515215 Α7 Β7 五、發明說明(5 ) ,那麼對於兩個多頻道授權訊息(Μ E C Μ )間的時間就 是不同的,因爲這個訊息通常是針對一組頻道,時間有可 能較多,事實上,這個訊息重複時間間隔,只在解碼器情 況緊急的時候插入,如圖的個案,可以看到每秒1到2個 訊息重複就夠了。 感謝以下詳細的解說,本發明得以被淸楚的了解,解 說參考了附錄的圖,來作爲例子而不是限制,如下: •圖一爲頻道Α與頻道Β傳送(ECM)與( Μ E C Μ )訊息; •圖二爲保全密碼組件。 在圖一中,圖上A、Β線的訊息能解譯成音頻或影像 信號,能夠觀察到規則的時間區段,就是每個頻·道單頻道 授權訊息(E C Μ )的傳送,在頻道A 〃中,'、A 〃單 頻道授權訊息(E C Μ )被傳送,在頻道B 〃中,Β 〃單頻道授權訊息〔E C Μ〕被傳送,而多頻道授權訊息 (ME CM),通常是頻道A與B,被傳送在兩個頻道。 在知道使用類比傳播的時代,單頻道與多頻道授權訊 息能有效地傳送在每一個頻道,一個頻道就是一個頻率, 另一方面,在數値傳播系統上,一個頻道就是一個頻率的 槪念是不存在的,多頻道授權訊息被加到這個頻道,或用 全面性的方法傳送資訊的改變,不需要每個頻道都重複。 根據這個例子,多頻道授權訊息(Μ E C Μ )的週期 比單頻道授權訊息(E C Μ )週期的一半還小,訊息( Μ E C Μ )的週期是由第一次使用時可接受的解密時間來 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -8 - --------;------------^------------·---^---一-------------- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 515215 A7 B7 五、發明說明(6 ) 決定,在本例中,已經收到至少一個訊息(E C Μ )與一 個訊息(Μ E C Μ )才有可能解譯訊號,這就是爲什麼對 於(ME CM)而言,大約一秒重複一次是可接受的,而 不會阻礙系統的p a s s · b a n d ,~但訊息(Μ E C Μ )被接收 並處理,當用新訊息(E C Μ )改變頻道時,能直接獲得 〇 從本發明物的另一種觀點,要考慮到由頻道密碼週期 開始的衰減,事實上,控制字元的改變,根據頻道在不同 的時候會被攻擊,因此,例如Α頻道中控制字元的改變從 C w — A 1到C w — A 2,根據本發明物,控制字元是經 由多頻道訊息(Μ E C Μ — 2 )得到的,另一方面來說, 假設新頻道Β總是用控制字元(C W - Β 1 )來操作,必 須使用到多頻道授權訊息(Μ E C Μ - 1 ),這是爲什麼 每個訊息(Μ E C Μ )含有幾個密碼週期的訊息,所以容 許頻道同時有不同的閒置狀態。 圖二表示出被傳送到多頻道授權訊息(ME CM)裡 這些資料的功能,單頻道授權訊息(E C Μ )帶有加密形 式的控制字元(C W ),被傳送到能解譯資訊的密碼組件 ,爲此,處理一般定義與系統有關的參數P i,Ρ 2到 Ρ η並且特別是這個頻道,這個組件用這些參數算出控制 字元(C W ),如本發明物,被傳送到多頻道授權訊息( ME CM)裡的這些資料,一旦解密,會更改參數上傳字 串或下傳字串到密碼組件(C U ),如本發明物特殊的形 式’最後的控制字元(C W )的獲得,是藉著包含在訊息 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱1 --------------____ (請先閱讀背面之注意事項再填寫本頁) 訂---------線丨_ 515215 A7 _B7 _ 五、發明說明(7 ) (Μ E C Μ )與訊息(E C Μ )之間的邏輯運算,如加、 減、乘或互斥運算。 如本發明物特殊的形式,包含在訊息(Μ E C Μ )中 的資訊被當成次要鍵使用,來解譯單頻道授權訊息( E C Μ )的內容。 (請先閱讀背面之注意事項再填寫本頁) 訂-— -線丨·! 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -10-515215 Α7 Β7 V. Description of the invention (1) The present invention is a system and process for decrypting information (data) transmission between a management system and a user decoder. Decoders for pay TV users can process signals from cable or wireless TV ’These signals are analog or digital. These signals are different whether they are audio signals, video signals or control signals. The latter contains a management message (called an EM message), that is, this message can directly control a decoder or a group of decoders, and a control message (called an EC MM message), that is, this message Contains authorization messages among others to decrypt signals in transit. In this application, we refer to a decryption authorization message (ECM) of a predetermined audio or video signal. It is necessary for pay TV users, including users who provide encryption for each channel based on one or more special keys, because in fact, users will pay for one channel but not for other channels. The authorization message (ECM) is encrypted with a special key to suit the management system. The user's decoder contains a secure cryptographic component that can interpret those messages. For confidentiality reasons, the authorization message of the decrypted signal (audio or video) is encrypted. Periodically, the management system sends these encrypted messages (ECM) to the cryptographic component. This cryptographic component can interpret these messages, manage the authorization and transmit the information required to the decoder to decrypt the audio or video signals according to the user's rights. The result of decryption by the cryptographic component is called "Control Character 〃" (abbreviation). This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -4-(Please read the precautions on the back before filling (This page) I ------- Order -------- I '▼ II · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 515215 Α7 Β7 V. Description of the invention (2) CW 〃, this control The characters are useful for the decoder and the user to have a complete message. As mentioned above, these control characters are changed regularly, just to prevent illegal program receivers from calculating control characters through a computer with powerful computing functions, and to enjoy free paid services. This is why control characters need to be changed regularly. Change, the cycle is usually 1 to 20 seconds, this cycle is called the password cycle. The authorization message (ECM) is transmitted at a higher frequency than the cipher period, for example, every 100 milliseconds is indispensable when starting the decoder service and when changing channels. In fact, to be able to see the transmitted program, the control characters are necessary for the encrypted signal. It is not good to wait five seconds in front of the screen just to see the clear picture. In the second example, each channel has control characters. The user should wait for the end of the password cycle to receive the authorization message to interpret the new channel signal. As in the previous situation, when the user cannot accept the channel change, it takes a few seconds. Delay. In fact, this is why the authorization message (ECM) is transmitted at frequencies between 5 and 20. When changing channels, the time between user designation and seeing the channel image must be the shorter of the two. According to general standards, the duration of about 500 milliseconds is acceptable. In time lapse, the next steps are as follows: • Allocate audio, video or control filters on the new channel; • Wait for the next message containing the aforementioned channel decryption control characters (this paper standard applies Chinese National Standard (CNS) A4 Specification (2) 0 × 297 mm) -5-(Please read the notes on the back before filling out this page) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs -1 II n ϋ n ϋ .1-OJ ·· ϋ nn III a— _1 «ϋ ϋ ϋ ϋ n ϋ ϋ ϋ ϋ ^ 1 ϋ n 1 I ϋ · 1 ϋ n < 515215 Α7 ___ Β7 V. Description of the invention (3) EC Μ); • Receive message (EC Μ) ) And send it to the cryptographic component for interpretation; • The cryptographic component executes the decryption algorithm and returns the decrypted control characters to the decoder; • Begins the MPEG decompression and waits for an image synchronization to complete. With this series of actions, they cannot be done in parallel, that is, as far as changing channels, each action must determine the maximum time. As far as the known high-security encryption algorithm is concerned, the more calculation is needed, the more time it takes. On the one hand, the decryption time is directly counted as the time between channel changes and cannot be extended to improve the quality of encryption. Why is the control character obtained by the algorithm's preservation being restricted for a limited time? The conventional method is mentioned in European Patent Document No. 0532 2202, and it continues, so in the selected channel, not only the channel authorization information (EC M), but also other channel authorization information, The latter transmits at low frequencies to prevent transmission congestion. The disadvantage of this method is that it fills the channel with unwanted messages, and remembers that all authorized messages are needed. In order to use it when changing channels, according to another unresolved view in this document, it is to increase the quality of the decryption algorithm. The time to switch between channels. The scope of the present invention is to propose a method and a transmission system for encrypted messages. This transmission system guarantees high security to achieve the purpose of controlling the characters of the decoder. This range uses control characters completely. This control character is combined with each paper size applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page) Ministry of Economy Printed by the Intellectual Property Bureau employee consumer cooperative I — — — — — — — ^. I — — — — — — — I — — — — — — — — I _. -6- 515215 A7 B7 V. DESCRIPTION OF THE INVENTION (4) Decryption of channel authorization messages (EC M), and decryption of a group of channel authorization messages usually. In the following description, the message of each channel is called `` single channel authorization message (ECM) '', and a common set of messages is called `` multichannel authorization message (EMCM) '' (Master ECM). The algorithm for processing messages (ECM) belongs to the type that is fast and provides limited security, so that a little time can be used when changing channels. On the other hand, according to the present invention, it is impossible to obtain the control characters (CW) by processing only the single channel authorization message (ECM), and a cryptographic component capable of interpreting the single channel authorization message (ECM) must have an equivalent A message received in a multi-channel authorization message (M EC M). The latter is decrypted by a key called the system, because it is independent from different channels. When changing or transmitting channels, the information suitable for the new channel is included in the single channel authorization message (EC Μ), which combines the multi-channel authorization message (Μ EC Μ) already in the cryptographic component, which is usually two channels. In this method, the decryption time of the message (Μ EC Μ) does not affect the calculation of the aforementioned transmission time. Therefore, the algorithm for decrypting the message (Μ EC Μ) is better, that is, it takes a longer time, but This is not detrimental to the transmission time. Furthermore, the simple use of different algorithms increases the security of the system. The content of the multi-channel authorization message (M EC Μ) can be changed according to all the cycles. This cycle and message (EC Μ) (Password time) is equal, or multiplied according to the period. If the time between two single-channel authorization messages (ECM) is important, since it directly intervenes in the calculation of the maximum transmission time between the two channels, this paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ~ (Please read the notes on the back before filling this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs d -------- Order --------- line, · ---- ---------- Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 515215 Α7 Β7 5. Invention Description (5), then the time between two multi-channel authorization messages (Μ EC Μ) is different Because this message is usually directed to a group of channels, there may be more time. In fact, this message repeats the time interval and is only inserted when the decoder is in an urgent situation. As shown in the figure, you can see 1 to 2 per second. It is enough to repeat the message. Thanks to the following detailed explanation, the present invention has been well understood. The explanation refers to the appended figure as an example and not a limitation, as follows: • Figure 1 shows channel A and channel B transmission (ECM) And (Μ EC Μ) messages; Full cryptographic component. In Figure 1, the messages on lines A and B on the figure can be interpreted as audio or video signals, and a regular time zone can be observed, which is the channel authorization information (EC Μ) for each channel. Transmission, in channel A ,, ', A 〃 single channel authorization message (EC Μ) is transmitted, in channel B ,, B 〃 single channel authorization message [EC Μ] is transmitted, and multi-channel authorization message (ME CM) ), Usually channels A and B, are transmitted on two channels. In the era of analog transmission, single channel and multi-channel authorization messages can be effectively transmitted on each channel, one channel is one frequency. On the other hand, In the digital broadcasting system, the idea that a channel is a frequency does not exist. Multi-channel authorization messages are added to this channel, or changes in information are transmitted in a comprehensive manner, and do not need to be repeated for each channel. In this example, the period of the multi-channel authorization message (Μ EC Μ) is less than half of the period of the single channel authorization message (EC Μ). The period of the message (Μ EC Μ) is an acceptable solution when first used. In time, the paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) -8---------; ------------ ^ ---- -------- · --- ^ --- One -------------- (Please read the notes on the back before filling out this page) Employees of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the Consumer Cooperative 515215 A7 B7 V. Description of Invention (6) It was decided that in this example at least one message (EC Μ) and one message (Μ EC Μ) have been possible to interpret the signal, which is why for (ME CM), repeating about once every second is acceptable without hindering the system's pass · band, but the message (Μ EC Μ) is received and processed. When the channel is changed with a new message (EC Μ) From another point of view of the present invention, it is necessary to consider the attenuation from the beginning of the channel password cycle. In fact, the change of control characters will be attacked at different times according to the channel. Therefore, for example, channel A The control characters change from C w — A 1 to C w — A 2 in accordance with the present invention. The control characters are obtained via multi-channel information (M EC M — 2). On the one hand, it is assumed that the new channel B always uses control characters (CW-Β 1) to operate, and a multi-channel authorization message (Μ EC Μ-1) must be used. This is why each message (Μ EC Μ) Contains messages for several password cycles, so channels are allowed to have different idle states at the same time. Figure 2 shows the function of these data transmitted to the Multi-Channel Authorization Message (ME CM). The single-channel Authorization Message (EC M) with the control characters (CW) in encrypted form is transmitted to the password that can interpret the information. The component, for this purpose, deals with the system-defined parameters P i, P 2 to P η and especially this channel. This component uses these parameters to calculate control characters (CW), such as the invention, which are transmitted to multiple channels. Once the data in the authorization message (ME CM) is decrypted, the parameters will be changed to upload the string or download the string to the cryptographic component (CU), such as the special form of the invention, the final control character (CW) is obtained It is included in the message. The paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 Public Love 1 --------------____ (Please read the precautions on the back before (Fill in this page) Order --------- line 丨 _ 515215 A7 _B7 _ V. Logical operations between the description of the invention (7) (Μ EC Μ) and the message (EC Μ), such as addition, subtraction, Multiplication or exclusive operation. As a special form of the invention, the information contained in the message (M EC Μ) The message is used as a secondary key to interpret the content of the single channel authorization message (EC Μ). (Please read the precautions on the back before filling out this page) Order---line The paper size printed by the cooperative is applicable to the Chinese National Standard (CNS) A4 (210 X 297 mm) -10-