WO2000041392A1 - Systeme de distribution de paquets de contenu - Google Patents

Systeme de distribution de paquets de contenu Download PDF

Info

Publication number
WO2000041392A1
WO2000041392A1 PCT/US2000/000079 US0000079W WO0041392A1 WO 2000041392 A1 WO2000041392 A1 WO 2000041392A1 US 0000079 W US0000079 W US 0000079W WO 0041392 A1 WO0041392 A1 WO 0041392A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
stream
packet
header
packets
Prior art date
Application number
PCT/US2000/000079
Other languages
English (en)
Inventor
Robert Schumann
David Goldshlag
David Kravitz
Siu-Leong Iu
Guillaume Mercier
Richard Whittemore
Michael Bergeron
Jack Ehrhardt
Richard Vitkus
Original Assignee
Digital Video Express, L.P.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digital Video Express, L.P. filed Critical Digital Video Express, L.P.
Priority to AU29597/00A priority Critical patent/AU2959700A/en
Publication of WO2000041392A1 publication Critical patent/WO2000041392A1/fr
Priority to US09/880,855 priority patent/US20020067914A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/434Disassembling of a multiplex stream, e.g. demultiplexing audio and video streams, extraction of additional data from a video stream; Remultiplexing of multiplex streams; Extraction or processing of SI; Disassembling of packetised elementary stream
    • H04N21/4344Remultiplexing of multiplex streams, e.g. by modifying time stamps or remapping the packet identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/231Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers, prioritizing data for deletion
    • H04N21/23106Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers, prioritizing data for deletion involving caching operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/236Assembling of a multiplex stream, e.g. transport stream, by combining a video stream with other content or additional data, e.g. inserting a URL [Uniform Resource Locator] into a video stream, multiplexing software data into a video stream; Remultiplexing of multiplex streams; Insertion of stuffing bits into the multiplex stream, e.g. to obtain a constant bit-rate; Assembling of a packetised elementary stream
    • H04N21/23608Remultiplexing multiplex streams, e.g. involving modifying time stamps or remapping the packet identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/414Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
    • H04N21/4147PVR [Personal Video Recorder]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/432Content retrieval operation from a local storage medium, e.g. hard-disk
    • H04N21/4325Content retrieval operation from a local storage medium, e.g. hard-disk by playing back content from the storage medium
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/845Structuring of content, e.g. decomposing content into time segments
    • H04N21/8455Structuring of content, e.g. decomposing content into time segments involving pointers to the content, e.g. pointers to the I-frames of the video stream

Definitions

  • the present invention relates to a transport packet generation apparatus and method that may be used in a secure content distribution system. More particularly, the present invention relates to an apparatus and method for providing and retrieving content on a medium such as a DVD optical disc. More particularly still, the present invention relates to providing content by processing and packing data packets onto a medium and then retrieving the content by reading data off the medium and processing the data to functionally reconstruct the original data packets for use in a content distribution system.
  • the present invention broadly relates to and provides a solution to this problem.
  • the content includes, for example, valuable audio or video content
  • unauthorized access by those who obtain the content may tend to reduce the profit margin of the content provider(s), who typically provide the content, e.g. to various listener and/or viewers, for a fee.
  • this problem is even more serious because the digital data is of sufficient resolution to be shown on a full size theater screen. This opens up a whole new area for content pirates to market their stolen property.
  • the invention is not so limited and may equally to any type of information or content data from any source, including without limitation audio and/or video data or other type of data or executables.
  • the unauthorized accesser is a content pirate, he or she may pose a serious threat to a content provider by inducing others to pirate the content as well. More particularly, the pirate may generally sell pirated access to the content at a lower cost than the legitimate content provider because the pirate obtains access to the content by using the legitimate provider's infrastructure and therefore does not have to invest resources to produce and disseminate the content.
  • IRD integrated receiver device
  • Fiat-Schamir plan is designed to make it difficult to forge personal information of one card, it does not prevent mass distribution of the forged card when and if the pirate has broken the smart card secrets used to prove identity. Also see, U.S. Patent No. 4,748,688 to Schamir.
  • a pirate could use a legitimate card for access authentication, i.e., to authenticate its right to access the content of the broadcast, and then use a pirated card to avoid being billed for the access, i.e. to avoid recording that the access was actually made by the legitimate card holder.
  • This type of pirating is referred to herein as an example of a type of attack known as a conduit attack.
  • the Johnson et al. approach determines whether a user device, in this case, a device which generally corresponds to a set top box, is valid by authenticating the user device to a provider device, in this case, a device which generally corresponds to a backend module.
  • this approach does not determine if the provider device is valid, i.e. if the provider device is authorized to operate with the user device or with a provider device. Accordingly, a pirate who successfully reverse engineers and modifies the provider device could overcome the security protocols in Johnson et al., and more importantly, could mass-produce the pirated provider device for distribution to and by users.
  • an apparatus for transport packet generation comprising: a content data receiver for receiving a data stream; a header extractor for extracting header data from the data stream; a data stream separator for separating data packets contained in the data stream; a transport stream generator for generating a transport stream using the data packets separated by the data stream generator; and a controller for controlling the data stream separator and the transport stream generator based on the extracted header data from the header extractor.
  • an apparatus for content data authoring comprising: a stream separating device for receiving a data stream and separating data packets contained in the data stream; a header extracting device for extracting header data contained in the data packets; a packet sector generating device for packing the data packets into sectors; and a controller for controlling the data stream separator and the packet sector generating device based on the header data extracted by the header extracting device.
  • a method according to the present invention for generating transport packets comprising: receiving for receiving a data stream; extracting header data from the data stream; separating data packets contained in the data stream based on the extracted header data; and generating a transport stream using the data packets separated by the data stream generator, based on the extracted header data.
  • a method for authoring content data comprising the steps of: receiving a data stream containing data packets; extracting header data contained in the data packets; separating data packets contained in the data stream based on the extracted header data; and packing the data packets into sectors based on the extracted header data.
  • the controller controls the packet sector generator to pack the data packets into sectors according to the type of data packet determined by information contained in the header data.
  • a virtual stream former for forming the data stream, wherein the data stream includes a plurality of data streams, and the virtual stream former combines a plurality of data streams of the same type
  • Figure 1 is a block diagram of an embodiment of the present invention.
  • FIG. 2 is a flow diagram depicting an embodiment of the Watermark Logic
  • Figure 3 is a block diagram of an embodiment of an aspect of the present
  • Figure 4 is a diagram depicting an exemplary embodiment of the present
  • Figure 5 is a block diagram of an exemplary aspect of the present invention.
  • Figure 6 is a diagram depicting an exemplary embodiment of the present invention wherein an ATSC transport packet stream is reconstructed from grouped packets in DVD sectors.
  • Figure 7 is a block diagram of an exemplary aspect of the present invention depicting a transport packet generation device.
  • Figure 8 is a block diagram of an exemplary aspect of the present invention depicting an ATSC packet packing device.
  • FIG. 1 is a simplified block diagram of an embodiment depicting an exemplary digital content distribution system according to the present invention.
  • a source 100 provides digital content to be displayed.
  • This digital content may be derived from any number of potential signal sources including but not limited to an HD-DVD (High Definition Digital Versatile Disc), a terrestrial or satellite broadcast, a cable broadcast, a digital VCR, a computer, a set-top box, or the internet.
  • HD-DVD High Definition Digital Versatile Disc
  • the source 100 acquires pre-authored content 103 from a content source, formats it and encrypts it so that it may be sent to a receiver 120 over an exposed interface 110.
  • Content 103 is typically authored movies and other multimedia data and applications and may be encrypted by any known encryption algorithm including but not limited to: TripleDES, DES, IDEA, or SKIPJACK.
  • the optical disc 102 comprises a DVD with a modified logical structure.
  • a media drive 107 is preferably a DVD disk drive capable of reading digital content 103 from the optical disc 102. This drive may include specialized hardware for reading any specially recorded optical disc 102.
  • the structure of the media drive 107 is well known.
  • the media drive 107 is controlled by a source control logic 109.
  • the digital content 103 read from the optical disc is input to a transport packet generation device 104, where DVD sectors 450 are processed to reclaim modified Advanced Television Systems Committee ("ATSC") transport packets which are then inserted into the content data stream as transport packets.
  • the transport packet generation device 104 may also insert commands for a receiver 120 and a conditional access module 140 ("CAM") into the content data stream.
  • the transport packet generation device 104 is controlled by the source control logic 109.
  • the digital content 103, in the form of DVD sectors 450 (Fig. 4) are processed sequentially. First, each DVD Sector Header 410 (Fig. 4) is analyzed to determine how to reconstruct the modified ATSC transport packets packed in sector 410 (Fig. 4).
  • ATSC packet header data is retrieved from the DVD sector.
  • This ret ⁇ eved packet header data is passed to the source control logic 109 which may include pointers which point to the beginning of frames, information that may be used to implement 'trick' modes, data that defines and assists in operating the source device, special device applications, special content applications, or the like.
  • the individual ATSC transport packets are degrouped from the DVD sectors.
  • a series of packing packets 401 , 402, 403, 404, 405 and 406 (Fig. 4) for each type of packet is created.
  • a determination is made as to the size of the largest individual packet, and all of the packing packets for that type are then conformed to that size.
  • Each packet so formed is then ret ⁇ eved from the transport packet generator 104. If a packet is fractional, it is saved for use when degrouping the next sector. In the illustrated embodiment, a 4-byte header is added back to the packet. It should be understood that the invention not so limited in terms of packet size. Then, consistent with the illustrated embodiment, the 4 bits of unique information from the original ATSC packet header are inserted into the reconstructed ATSC packet header. Next, the packet is overlaid onto the packing packet created for this particular type of packet. This ATSC transport packet (now a part of a content packet stream) is input to a super encrypt logic 105 as part of the content data stream.
  • the super encrypt logic 105 encrypts the digital content 103 using a secret (key) preferably known to the super encrypt logic 105 and a super decrypt logic 141 in the conditional access module 140. Thus, the content is protected as it travels across a first interface 110.
  • the super encrypt logic 105 preferably stores multiple keys which allow the transmission of a super encrypted content data stream on a communication line 180 to multiple receivers 120 and their associated conditional access modules 140.
  • the content may be encrypted by any encryption algorithm including but not limited to Triple DES, DES, IDEA, or SKIPJACK. It should be noted that it is possible to pass data through the super encrypt logic 105 without encrypting it.
  • a decision as to whether to encrypt data may be provided by instructions, for example instructions contained within the digital content 103, or may be received from a backend 170.
  • the super encrypt logic 105 is controlled by the source control logic 109.
  • a modem 106 is utilized to communicate to the conditional access module 140 through the receiver 120.
  • the modem 106 is used to keep the source 100 informed regarding the state of the conditional access module 140 and may also be used to pass information between the source 100 and the rest of the system.
  • the modem 106 which is preferably controlled by the source control logic 109, may alternatively be replaced by various communications devices well known in the art.
  • a modem switch 108 switches a modem 121, located in the receiver 120 between ports A and B.
  • Port A connects the modem 121 to the modem 106 located on the source 100.
  • Port B connects the modem 121 to the backend 170.
  • the backend 170 is typically located remotely from the source 100.
  • connection via port B connects modem 121 to the backend 170 through a telecommunications network, (e.g. a telephone company modem, a direct modem to modem connection, or a connection through an Internet Service Provider ("ISP")).
  • ISP Internet Service Provider
  • the source control logic 109 controls the position of modem switch 108.
  • the default position of the modem switch 108 connects the modem 121 via port B to the backend 170 except when the source 100 requires access to the receiver 120, e.g. to communicate with the conditional access module 140.
  • Other configurations of the switch may, for example, connect the modem 106 to the backend 170.
  • Operation of and communications with the source 100 is preferably controlled by the source control logic 109.
  • the source control logic 109 receives data from the transport packet generation device 104 and pointers, which point to the beginning of frames for use in various operational modes.
  • the first interface 110 preferably contains communications lines between the source 100 and receiver 120.
  • the p ⁇ mary communication line through the first interface 110 connects the super encrypt logic 105 to the super decrypt logic 141 , (the latter preferably being provided on the conditional access module 140), passing via a second interface 130 to the receiver 120 and the conditional access module 140.
  • the first communications line 180 which connects between the first and second interfaces, 110 and 130 respectively, may comprise an 8/VSB or 16/VSB interface.
  • the communication line 180 transports the modified ATSC transport packets from the source 100 to the conditional access module 140.
  • the 8/VSB or 16/VSB interface may be replaced with a fast digital bi-directional interface capable of handling both video and commands.
  • an IEEE 1394 interface could combine both the VSB and modem lines.
  • a second communications line 183 connects the modem switch 108 to the modem 121.
  • Digital content 103 is arranged to fit into the bandwidth limitation of the modified transport packet stream.
  • the illustrated embodiment preferably maintains a 19.39 Mbps transport package throughput.
  • other content may be sent on the transport package stream by lowering the bandwidth available for the video and audio content, and using the extra bandwidth to transport other content, e.g. commands and sub pictures.
  • the receiver 120 may receive content from any source 100.
  • the modem 121 located in the receiver 120, provides a communication link between the conditional access module 140 and depending upon the position of the modem switch 108, the source 100 or the backend 170.
  • Data communicated over through modem 121 includes information relating to the state of the conditional access module 140, and feedback data to a communication and control logic 144 from the source control logic 109.
  • the backend 170 may, for example provide account and system management.
  • Uploaded information may include any or all of the following: content key information used to enable content decryption, super encryption/decryption key information used to enable the super encryption functionality, interface encryption/decryption key information used to enable the interface protection functionality, play window data for specific digital content or title tables.
  • the title tables may include data such as watermark identification, conditional access keys for a content decrypt logic 142, and play authorization data. This communication link may also be used to download play journals, system statistics, data, etc.
  • An interface decryption logic 123 decrypts the data stream returned from the conditional access module 140 to the receiver 120 for further processing by a transport packet demultiplexer logic 124 and a content decoder 125 before being sent to a monitor 160.
  • the interface decryption logic 123 uses a shared secret between itself an interface encryption logic 146 to perform decryption.
  • the decryption algorithm used corresponds to the encryption algorithm used in the interface encryption logic 146.
  • This shared secret may be generated by any known technique or may be generated by a technique disclosed in copending and commonly assigned application Serial No. 09/252,013.
  • a receiver control logic 126 controls the operation of the receiver 120,
  • the receiver control logic 123 The receiver control logic 123
  • the transport packet demultiplexer logic 124 converts the transport packet
  • Video and audio elementary data packets are forwarded to the content decoder 125.
  • the rest of the packets are
  • the content decoder 125 decodes the digital content, now formatted in a
  • a digital signal may be provided for an LCD or plasma display, whereas an analog signal might be more efficient for a conventional CRT.
  • the content decoder 125 may dynamically handle different
  • the second interface 130 provides a signal path between the conditional
  • the conditional access module 140 may be a renewable device, having logic to analyze the system and the content 103 in order to determine whether the content 103 may be displayed.
  • renewable we mean that the conditional access module may be updated by either replacing the device and/or secrets used by the conditional access module and preferably reestablish pairing relationships between the conditional access module and the other devices in the system.
  • the conditional access module 140 may also contain logic to prevent the content 103 from being displayed, logic to log system operations, etc.
  • the conditional access module 140 may include the communications and control logic 144, the super decryption logic 141 , content decryption logic 142, fingerprint logic 143, the interface encryption logic 146, and the copy protection and playback control logic 145. Each of these elements will be discussed below.
  • the super decryption logic 141 uses a shared secret between itself and the super encryption logic 105 to decrypt the super encrypted transport packets encrypted by the super encryption logic 105.
  • the content decryption logic 142 uses a secret key provided by the backend 170 to decrypt the content 103, which was encrypted at the time it was authored utilizing the corresponding secret key.
  • the interface encryption logic 146 uses a shared secret between itself and the interface decryption logic 122 to encrypt the transport packets for transport over the second interface 130 to the interface decryption logic 122. The purpose of this re-encryption is to protect the transport packets as they travel over the second interface 130 where the packets may be exposed to third parties.
  • the encryption algorithm used may be any known encryption algorithm such as DES, Triple DES, or an algorithm disclosed in copending and commonly assigned application Serial No. 09/252,013.
  • the fingerprint logic 143 adds watermarks to the output signal of the interface encryption logic 146.
  • the watermark is embedded into the digital content and provides tracing information about a particular use, or an instance of the content being placed into a multimedia signal.
  • the fingerprint information is hard to detect, hard to remove, and resistant to collusion.
  • Some exemplary identifying information about the play session includes, but is not limited to, time of access, serial number of the content being viewed, source 100 identification data, receiver 120 identification data, conditional access module 140 identification data, and output device 160 identification data.
  • the fingerprint logic 143 preferably uses known techniques to embed the watermark into the content 103.
  • the protection and playback control logic 145 compares the watermark data detected from the content display stream by a watermark logic 164 for the output device 160 with data which indicates what the appropriate watermark should be for the digital content 103 currently being played.
  • the protection and playback control logic 145 sends a message back to the watermark logic 164 as to whether to disable a display 161 in the output device 160, hence providing a mechanism to prevent unauthorized viewing of the content 103.
  • the message must have enough information for the watermark logic 164 to verify the message.
  • the message may be verified using any verification function; for example a hash function utilizing a shared secret between the protection and playback control logic 145 and the watermark Logic 164, as described in copending, commonly assigned application Serial No.
  • the blocks in the conditional access module 140 are preferably controlled by the communications and control logic 144.
  • the communications and control logic 144 also handles communication between the conditional access module 140 and the source 100, including communications regarding the status of the conditional access module 140 sent back to the source 100, and user interactions and control of system functions.
  • the communications and control logic 144 also handles communications between the conditional access module 140 and the backend 170, including updating title tables, updating keys, updating watermark identification, and downloading transaction and system data.
  • a third Interface 150 transports video data, audio data, and authorization data from the receiver 120 to the output device 160.
  • the authorization data is preferably transported between the copy protection and playback control logic 145 typically in the conditional access module 140, and the watermark logic 164 in the output device 160.
  • This link facilitates an important copy protection mechanism utilized in this system architecture. Validation data is transported back and forth over this link whereby a decision may be made by the watermark logic 164 as to whether to allow the content 103 to be displayed on the display 161.
  • the output device 160 receives a display stream from the receiver 120, retrieves watermark data from the display stream and, in conjunction with the copy protection and playback control logic 145, decides whether the content may be displayed. If the decision is affirmative, then the content 103 is enabled for the display 161. This process may be performed regularly throughout the viewing of the content 103.
  • the output device 160 typically includes the display 161 , a display enable 162, the fingerprint logic 163, the watermark logic 164, and a video logic 165.
  • the display 161 may be any video display device (e.g., a CRT, a plasma display device, a projection display device, or an LCD display device).
  • the display enable logic 162 inputs a signal from the watermark logic 164 and enables or disables the output of the display 161 appropriately.
  • Fingerprint logic 163 embeds identifying information into the display signal similar to the fingerprint Logic 143. It may be advantageous to add other identifying information related to the output device 160 in addition to the information described in the description of the fingerprint logic 143.
  • the watermark logic 164 removes watermarks that were embedded in the content 103. Each time it identifies new watermark data, this information is relayed to the copy protection and playback control logic 145 for analysis. Feedback is then returned from the copy protection and playback control 145 about the validity of the content stream for presentation on the display 161. A signal is then sent to the display enable logic 162 to disable or enable the display 161.
  • the watermark logic 164 may ask for fresh authentication.
  • the watermark logic 164 is preferably paired with the copy protection and playback control logic 145 and verifies the authorized message from the copy protection and playback control 145.
  • the video logic 165 receives the display stream over a communications line 182 from the content decoder 125 and passes a copy of the display content stream to the watermark logic 164, and the fingerprint logic 163.
  • the video logic 165 converts the decoded content data into a content signal that may be used by the display 161.
  • the backend 170 for the system is usually located remotely from the rest of the system. It preferably includes physical data processing equipment, communications links, and software systems.
  • the backend 170 provides functions that include, but are not limited to, account management, content access, encryption/decryption pairing assistance, and uploading to the system, title keys, watermarks, and data required for content access.
  • Data required for content access preferably include recalled content, prices, release dates, promotions, and downloads from the system such as content access journals and system journals.
  • data stream refers to a continuous or semi- continuous flow of data that is moving through the system. It is convenient to label these streams to assist in understanding the flow of data through the system. Although data may travel through the system, it is the collection of data that comprises the data stream and not the hardware per se. Typically, there are several data streams in the system.
  • They preferably include a super-encrypted content data stream (which may be found on the communications line 180), a watermark authorization stream (which may be found on the communications line 181 ), a content display stream (which may be found on the communications line 182), a receiver back channel data stream (which may be found on the communications line 183), a conditional access module back channel data stream (which may be found on the communications line 184), an interface stream (which may be found on the communications line 185), a backend data stream (which may be found on the communications line 186), unencrypted content stream
  • a super-encrypted content data stream which may be found on the communications line 180
  • a watermark authorization stream which may be found on the communications line 181
  • a content display stream which may be found on the communications line 182
  • a receiver back channel data stream which may be found on the communications line 183
  • a conditional access module back channel data stream which may be found on the communications line 184
  • an interface stream which may be found on the communications line
  • the super encrypted content data stream which contains super encrypted content data is transported over communications line 180 to the receiver 120 and the conditional access module 140 from the super encrypt logic 105 on the source 100.
  • This data stream does not always have to be super encrypted.
  • the super encrypt logic 105 may be enabled or disabled by the source control logic 109.
  • the data stream from transport packet generation logic 104 will preferably pass through super encrypt logic 105 without any modification.
  • An authorization data stream is transported over communications line 181 which connects the watermark logic 164 in the output device 160 and the copy protection and playback control logic 145 in the conditional access module 140 over the second interface 130 and the third interface 150. Information relating to authorizing the display of content 103 on the output device 160 is communicated in this data stream.
  • the communications line 182 transports the content display stream from the content decoder logic 125 on the receiver 120 to the video logic 165 on the output device 160 over the third interface 150.
  • This data stream carries the decoded content for display on the output device 160.
  • Two of the data streams comprise a back channel for this system, a receiver back channel data stream is (which may be found on the communications line 183) and a CAM back channel data stream (which may be found on the communications line 184).
  • the communications line 183 transports the receiver back channel data stream from the modem 121 on the receiver 120 to the modem switch 108 on the source 100 over the first interface 110.
  • the communications line 184 carrying the CAM Back channel data stream connects the communications and control logic 144 on the conditional access module 140 to the modem 121 on the receiver 120 over the second interface 130.
  • the interface data stream (which may be found on communications line 185) carries a freshly encrypted version of the content after the conditional access module has otherwise processed it from the interface encrypt logic 146 on the conditional access module 140 to the interface decrypt logic 123 on the receiver 120 over the third interface 130. This fresh encryption of the content protects the content while being transported over the second interface 130 where it could be compromised.
  • the communications line 186 transports a backend data stream between the backend 170 and the system through the modem switch 108 on the source 100 over the fourth interface 172.
  • the unencrypted content stream (which may be found on communications line 187) provides a shortcut for the digital content stream to proceed directly to the transport packet demultiplexer 124. In the cases where the content is not encrypted and no protection is needed for the digital content 103, the pathway through the conditional access module may be bypassed.
  • the transport packet demultiplexer logic 124 may easily determine if the unencrypted content stream (which may be found on communications line 187) is in fact unencrypted. If the content data stream (which may be found on communications line 187) is unencrypted, then the transport packet demultiplexer logic 124 will process data from this stream rather than the data coming from the interface decrypt logic 123.
  • the receiver/CAM control stream (which may be found on communications line 188) provides a communications channel for the conditional access module 140 to communicate with the receiver 120. Information that two subsystems might share could include status data, synchronization data, and control data.
  • FIG. 164 shown on figure 1 , there is depicted an exemplary logic (which includes analysis of the watermark contained in the content) used to determine if the output device 160 should or should not be enabled.
  • the watermark logic 164 initializes the monitor 161 to an enabled state by sending an enable signal to the monitor enable logic 162.
  • Step S204 The watermark is removed from the video content at step S206.
  • step S206 the watermark that was just removed from the video content is compared to a predetermined watermark which, may be a previous watermark, at step S208. If the watermarks are the same, the content is authorized for viewing and the display 161 is enabled at step S218. In essence, this step is detecting a change in the watermark. If the watermark has changed, then a copy of it is sent to the protection and playback control logic 145 in the conditional access module 140 for authorization at step S210. At step S212, the watermark logic 164 waits for a response from the copy protection and playback control logic 145.
  • step S214 If the response has timed out (step S214), then the display is disabled at S220. Otherwise control passes to step S216 where the response is analyzed to see if the content is authorized for viewing. If the content is authorized for viewing, then the display 161 is enabled at step S218. If the content is not authorized for viewing, then the display 161 is disabled at step S220. Control then returns to step S204 where the process starts again.
  • Figure 3 depicts the creation of a single exemplary ATSC transport packet stream which combines several different display streams, in essence creating virtual streams. This process takes place as part of the disc authoring process.
  • Authored content 103 may have multiple streams. There may be several types of streams including but not limited to audio and video. Each stream type may have multiple streams. Examples include multiple video angles, multiple languages, and different rating cuts.
  • Blocks 300, 301 and 302 represent n virtual video streams for a channel i.
  • the display stream for virtual video channel 1 , option 1 is V (>1 300.
  • the display stream for virtual video channel 1 , option 2 is V, ,2 301.
  • the display stream for virtual video channel 1 , option n is V, ,n 302, where n may be any value between 1 and the maximum number of choices available for this virtual video stream.
  • the video virtual stream former 303 accepts as input all of the possible video display streams that need to be recorded on content 103.
  • the video virtual stream former 303 combines these streams into one continuous ATSC stream.
  • the resultant stream is V, 304.
  • Blocks 305, 306 and 307 represent n virtual audio streams for a channel j.
  • the display stream for virtual audio channel 1 , option 1 is V Jp1 305.
  • the display stream for virtual audio channel 1 , option 2 is V Jp2 306.
  • the display stream for virtual audio channel 1 , option n is V J]m 302, where m may be any value between 1 and the maximum number of choices available for this virtual audio stream.
  • the audio virtual stream former 307 accepts as input all of the possible audio streams that need to be recorded on content 103.
  • the audio virtual stream former 307 combines these streams into one continuous ATSC stream.
  • FIG. 4 depicts an example of an ATSC transport packet stream, grouped and packed into DVD sectors.
  • the ATSC transport packet stream consists of packets for two video streams and two audio streams.
  • each DVD sector will only contain ATSC packets of a particular display stream.
  • Each packet in the ATSC transport packet stream 400 is preferably processed sequentially, as follows. The packet header is analyzed to determine which stream the corresponding packets come from. The packet is then packed into a DVD sector reserved for only packets of the type matching this packet.
  • ATSC transport packet stream 400 may fit in and are packed into DVD sector 401. After ATSC transport packet stream 400 is filled, the next Vi packet will be packed into DVD sector 405, and so on. In this example the same process takes place for the A ⁇ , A 2 , and V 2 packets. Provisions may be made for packing packets across sector boundaries, by storing enough information in the sector headers to restore the packets. Such information may only need to be a flag to indicate that the first packet of data in a sector is fractional. The system may then concatenate this packet to the last packet of this type received when reconstructing the stream later.
  • Figure 5 depicts exemplary audio and video streams laid out on a DVD disc.
  • the DVD sectors 450 contain packets of only one stream each.
  • Sectors 501 , 502, 503, 513, 514, and 515 contain packets for a first video stream.
  • Sectors 507, 508, and 509 contain packets for a second video stream.
  • Sectors 504, 505 and 506 contain packets for a first audio stream.
  • Sectors 510, 511 and 512 contain packets for a second audio stream.
  • the packets may be laid on the disc in any order, but for efficiency's sake, they are usually laid out in as close an order to their likely access as possible.
  • the optical disc may be authoring as follows.
  • the disc may contain several
  • elementary streams that may include but are not limited to elementary audio and
  • ATSC transport packet streams A virtual stream is created as shown in Figure 3
  • the ATSC transport packet stream 400 is grouped into DVD sectors 450 as shown in figure 4, including the case of padding packets.
  • transport packets may be modified utilizing common well-known compression
  • a sector header is created. Four bits of unique information from the ATSC
  • Figure 4 shows an
  • each sector may only carry one type of data corresponding to the ATSC transport packet types.
  • Sector packet types may include but are not limited to video or audio packets.
  • the sector header will carry information to assist the reconstruction of the original ATSC transport packets. This information may include but is not limited to pointers to packets which contains the beginning of a frame, pointers to the beginning of a fractional packet, location data for audio and video packets, the number of packets packed into this frame, the sector type identifier, and unique ATSC packet header data.
  • FIG. 8 shows an ATSC packet stream to DVD sector data generator device 800 that may create DVD sector data for use by the present invention.
  • the ATSC transport packet stream 400 is input to a packet separator 802 that separates and outputs each independent data stream to a buffer assigned to that stream type.
  • Buffers 806, 808 through 810 are each assigned to hold a specific type of ATSC data packets. For example, first buffer 806 might be assigned to hold all data in a first video stream and a second buffer 808 might be assigned to hold all data in a first audio stream, while an nth buffer 810 may be assigned to hold all data in an nth video stream.
  • the packet separator 802 also outputs a copy of the data packets to a header extractor 804 which extracts the ATSC packet header data.
  • ATSC packet header data is output to a packet sector generator 812 where it is processed along with the ATSC packets stored in the buffers 806, 808, through 810.
  • a sector header is created.
  • Four bits of unique information from the ATSC packet header are saved for insertion into the DVD-sector header for use during reconstruction. These four bits include 2 transport_scrambling_control bits and two adaption_field_control bits.
  • the four-byte header from the ATSC transport packet may now be discarded as well as padding packets. Information required to restore the ATSC packet stream, including padding packets, is saved for insertion into the DVD sector headers.
  • the DVD sector data 450 is output from the packet sector generator 812.
  • Figure 6 shows the reconstruction of the ATSC transport packet stream 400 from DVD data sectors 750.
  • Figure 7 is an exemplary embodiment of a transport packet generator 104 which may reconstruct an ATSC transport
  • DVD sector data is input to the transport packet generator 104 from the media drive 107. This data is received by the content data receiver 702.
  • a first copy of the DVD sector data is transported to a header extractor 704 which extracts data from the DVD sector header 408 and outputs the header data to the controller 706.
  • the controller 706 will use the header data to control the reconstruction and to provide data in reassembling the o ⁇ ginal ATSC packet headers.
  • a second copy of the DVD sector data is transported to a stream separator 708.
  • the stream separator 708 decides which data stream the packets in the current sector being processed belong to and forward those packets to a buffer (710, 712 through 714) assigned to handle that packet type.
  • a transport stream generator 716 reconstructs an ATSC transport packet stream by selectively removing the packets from the buffers 710, 712 through 714 as directed by the controller 706.
  • the resultant reconstructed ATSC packet data 400 is then output from the transport packet generation device 104.
  • the present invention provides a series of security features to adequately protect the transmission of content data from a source device to a display device.
  • the security features include pairing, super-encryption and re-encryption, interface protection, pirate card rejection, watermark detection and authorization request by
  • conditional access module 140 to source 100, receiver 120 to conditional access
  • Interface protection techniques are used to protect content while traveling
  • the encrypted content is encrypted again using a secret known only to the super encrypt logic 105 and super decrypt logic 141 , in the case that the conditional
  • the encryption may be any type of encryption including DES and triple DES.
  • An example includes title based rejections where the
  • conditional access module 140 must prove its identity to the system based on a title by title basis. Another example includes rejection because the conditional access module was not authorized to communicate in the system.
  • Watermark detection and authorization request by the output device 160 is another protection mechanism utilized in this system.
  • a content data stream 182 is generated by a content decoder 125. This content decoder may be an MPEG decoder or some variant.
  • Data is transported to the watermark logic 164 through the video logic 165. The watermark logic pulls out the watermark data from the data content stream and compares the watermark data to see if watermark data has changed from the last authorized watermark or if a timeout period has occurred. If either case has happened, then the watermark logic 164 requests a new authorization from the copy protection and playback control logic 145 to enable the display 161.
  • the security architecture utilizes a bi-directional communications path between the source 100 and the receiver 120. In particular, use is made of the path from the conditional access module 140 to the source 100 in order to strengthen the pirate-card-rejection verifier functionality.
  • the conditional access module 140 is accessed while present in a card-slot of the receiver 120 during communications between the source 100 and conditional access module 140, communications between the conditional access module 140 and receiver 120, and communications between the conditional access module 140 and the backend 170. It is the responsibility of the backend 170 to reconcile charges. In particular, conditional access modules 140 associated with different receiver devices 120 do not directly communicate.
  • a conditional access module 140 to source 100 pairing provides for a means of distributing a long-term shared secret value secret to the source 100 and conditional access module 140.
  • the one-way pairing authenticates the conditional access module 140 to the source 100.
  • the conditional access module 140 will be described below.
  • conditional access module 140 to source
  • conditional access module 140 which is not in
  • a key may be used to encrypt the encrypted digital content 103 that results from processing the plaintext content data under the conditional
  • the session keys may derive freshness from counter values
  • conditional access module 140 in the clear by the source 100.
  • conditional access module 140 There is no need for the conditional access module 140 to provide freshness to the source 100, since replay of the super-encrypted content 103 to the conditional
  • the super-encryption mechanism employed by the source 100 also provides for interface protection of the encrypted digital content 103, which could
  • conditional access module 140 is logged by the conditional access module 140 at least once as a condition of
  • the Title ID information may be transmitted (assuming that it is otherwise).
  • the source 100 may require an authenticated receipt of the Title ID information from the conditional access module 140 prior to transmission of the (super-encrypted) digital content 103.
  • the receipt may be freshly authenticated by the conditional access module 140, for subsequent
  • the authentication may be
  • the receiver 120 may supply freshness to the conditional access module 140 in order to prevent effective replay of the content data 103 from the conditional
  • the conditional access module 140 encrypts the plaintext content 103 read from the optical disc using a session key
  • session key computation may derive freshness from a counter value provided by
  • a receiver 120 to conditional access module 140 pairing provides for a means of distributing a long-term shared secret value to the
  • conditional access module 140 and receiver 120 The receiver 120 to conditional
  • access module 140 pairing provides for implicit authentication by ensuring that only the designated receiver 120 will be able to derive the session key by means
  • This one-way pairing authenticates the receiver 120 to the conditional access module 140.
  • the receiver 120 may accept
  • Session keys may be derived through any number of techniques known to
  • a single-DES session keys could be derived by
  • Hash 96 messages I I Hash 64 (counter I I shared secret value I I counter)
  • Hashg 6 counter 1 I shared secret value I I
  • Hash 56 () may be derived by extracting the 56 least significant bits of a 160-bit hash word
  • Hash 64 ( ) may be derived by extracting the 64 least significant bits of the hash word
  • Hash 96 ( ) may be
  • I I denotes
  • the conditional access module 140 to source 100 pairing may be achieved as follows.
  • the backend 170 could issue a certificate binding the source ID to the Diffie-Hellman public key of the conditional access module 140, g Xca m
  • ayer need not be
  • the session keys may
  • the player's Diffie- Hellman key pair and source ID may be established during the manufacturing process or may be generated in the source 100 using suitable randomness.
  • a source ID may be used by the source 100 to determine whether it is authorized to communicate with the conditional access module 140, and thus could be chosen so as to be very unlikely to coincide with the IDs of other sources.
  • the receiver 120 to conditional access module 140 pairing may be achieved as follows. In order to effect the pairing between the conditional access module 140 and the receiver 120, the receiver 120 may transmit to the conditional
  • the devices 120, and the conditional access module 140 may transmit to the receiver
  • the certificate may be verified by the conditional access module 140
  • conditional access module 140 may be checked for a match against the 256 bits transmitted to the conditional access module 140 by the receiver 120 (after the conditional access
  • module 140 transmits g Xcam to the receiver 120. If the two 256-bit blocks match,
  • conditional access module 140 may set the long-term shared secret value held by it with the receiver 120 to the 256 least significant bits of the Diffie-Hellman value g Xf ⁇ nal*Xcam j ⁇ e certificate and evidence-of-compliance block of the receiver
  • the device's 120 g xfinal may be sent (authenticated by the conditional access module 140 to the backend 170.
  • the session keys and authenticated receipts may be computed based on the long-term shared secret value with the receiver 120.
  • receiver 120 has a good random number generator, in that we make productive use of such randomness but ensure that an acceptable level of security is preserved even if such randomness maynot be relied upon for strength.
  • a receiver 120 should be able to move between service providers without introducing trust dependencies between those providers.
  • a clone device may be defined as either an exact copy of a manufactured receiver 120 or built from the keying material the licenser gave the manufacturer for that device.
  • Unit-by-unit licensing requires that the licensers produce and distribute the secrets to be held by the receiver 120.
  • Limited manufacturer and licenser responsibility for these secrets requires that the secrets be placed in the receiver 120 not be valid forever in the sense that knowledge of these secrets is not sufficient to compromise compliant receivers 120. Eliminating trust dependencies between service providers requires that service providers not know receiver 120 keys, and therefore that public-key cryptography is used.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Television Signal Processing For Recording (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

Selon cette invention, un appareil de génération de paquets de transport et un procédé correspondant sont utilisés dans un système qui fournit un contenu tel que des films ou de la musique. L'invention concerne un mécanisme pour fournir et récupérer du contenu sur un support tel qu'un disque optique DVD. Dans l'un des aspects, on fournit le contenu en traitant et en empaquetant les paquets de données sur le support. Dans un autre aspect de l'invention, le contenu est récupéré par la lecture des données à partir du support et par leur traitement permettant la reconstruction fonctionnelle des paquets de données d'origine, utilisés dans le système pour fournir du contenu.
PCT/US2000/000079 1999-01-06 2000-01-05 Systeme de distribution de paquets de contenu WO2000041392A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU29597/00A AU2959700A (en) 1999-01-06 2000-01-05 Content packet distribution system
US09/880,855 US20020067914A1 (en) 2000-01-05 2001-06-15 Content packet distribution system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11483399P 1999-01-06 1999-01-06
US60/114,833 1999-01-06

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US09/880,855 Continuation US20020067914A1 (en) 2000-01-05 2001-06-15 Content packet distribution system

Publications (1)

Publication Number Publication Date
WO2000041392A1 true WO2000041392A1 (fr) 2000-07-13

Family

ID=22357683

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/US2000/000077 WO2000041056A2 (fr) 1999-01-06 2000-01-05 Systeme et procede de distribution de contenu numerique
PCT/US2000/000079 WO2000041392A1 (fr) 1999-01-06 2000-01-05 Systeme de distribution de paquets de contenu

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/US2000/000077 WO2000041056A2 (fr) 1999-01-06 2000-01-05 Systeme et procede de distribution de contenu numerique

Country Status (2)

Country Link
AU (2) AU2959700A (fr)
WO (2) WO2000041056A2 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110769298A (zh) * 2018-07-26 2020-02-07 联发科技股份有限公司 信号处理电路以及相关方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0833514A2 (fr) * 1996-09-27 1998-04-01 Sony Corporation Système et procédé pour décoder des données, dispositif et procédé de transfert, et dispositif et procédé de réception
EP0838926A2 (fr) * 1996-10-22 1998-04-29 Sony Corporation Dispositif et procédé de transmission et de réception de données isochrones
EP0858230A1 (fr) * 1994-04-08 1998-08-12 Koninklijke Philips Electronics N.V. Enrégistrement et reproduction d'un signal d'information MPEG sur/à partir de un support d'enrégistrement
EP0917355A1 (fr) * 1997-11-14 1999-05-19 Sony International (Europe) GmbH Distribution de flux de transport MPEG-2 sur un réseau domestique IEEE 1394
EP0949820A2 (fr) * 1998-04-08 1999-10-13 Pioneer Electronic Corporation Appareil de conversion d'un flux de données

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5659613A (en) * 1994-06-29 1997-08-19 Macrovision Corporation Method and apparatus for copy protection for various recording media using a video finger print
EP1244306B1 (fr) * 1994-07-08 2008-02-06 Sony Corporation Réception de signaux de télédiffusion en accès conditionnel pour la reproduction plus d'une fois
US5574787A (en) * 1994-07-25 1996-11-12 Ryan; John O. Apparatus and method for comprehensive copy protection for video platforms and unprotected source material
DE69525170T2 (de) * 1994-09-09 2002-10-10 Titan Corp System mit bedingtem zugang
EP0715241B1 (fr) * 1994-10-27 2004-01-14 Mitsubishi Corporation Appareil pour système de gestion de droits d'auteur de données
JP3729529B2 (ja) * 1994-10-28 2005-12-21 ソニー株式会社 デイジタル信号送受信システム
WO1997022206A1 (fr) * 1995-12-11 1997-06-19 Philips Electronics N.V. Marquage d'un signal video et/ou audio
AU3207697A (en) * 1996-05-15 1997-12-05 Macrovision Corporation Method and apparatus for copy protection of copyrighted material on various recording media
JP3671992B2 (ja) * 1996-10-28 2005-07-13 ソニー株式会社 映像信号受信装置および映像信号受信方法
ATE224124T1 (de) * 1997-01-27 2002-09-15 Koninkl Philips Electronics Nv Verfahren und vorrichtung zur übertragung von inhaltsinformation und darauf bezogener zusatzinformation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0858230A1 (fr) * 1994-04-08 1998-08-12 Koninklijke Philips Electronics N.V. Enrégistrement et reproduction d'un signal d'information MPEG sur/à partir de un support d'enrégistrement
EP0833514A2 (fr) * 1996-09-27 1998-04-01 Sony Corporation Système et procédé pour décoder des données, dispositif et procédé de transfert, et dispositif et procédé de réception
EP0838926A2 (fr) * 1996-10-22 1998-04-29 Sony Corporation Dispositif et procédé de transmission et de réception de données isochrones
EP0917355A1 (fr) * 1997-11-14 1999-05-19 Sony International (Europe) GmbH Distribution de flux de transport MPEG-2 sur un réseau domestique IEEE 1394
EP0949820A2 (fr) * 1998-04-08 1999-10-13 Pioneer Electronic Corporation Appareil de conversion d'un flux de données

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
AZADEGAN F ET AL: "DATA-PLACEMENT PROCEDURE FOR MULTI-SPEED DIGITAL VCR", IEEE TRANSACTIONS ON CONSUMER ELECTRONICS,US,IEEE INC. NEW YORK, vol. 40, no. 3, 1 August 1994 (1994-08-01), pages 250 - 256, XP000471181, ISSN: 0098-3063 *

Also Published As

Publication number Publication date
WO2000041056A2 (fr) 2000-07-13
AU3343400A (en) 2000-07-24
AU2959700A (en) 2000-07-24
WO2000041056A3 (fr) 2000-09-28

Similar Documents

Publication Publication Date Title
US7698570B2 (en) Digital content distribution system and method
US20020067914A1 (en) Content packet distribution system
US10848806B2 (en) Technique for securely communicating programming content
US7349886B2 (en) Securely relaying content using key chains
KR100917720B1 (ko) 디지털 멀티미디어 콘텐트 데이터를 안전하게 배포하는 방법
US7080039B1 (en) Associating content with households using smart cards
US7124938B1 (en) Enhancing smart card usage for associating media content with households
KR100882373B1 (ko) 트러스트 도메인에서 프로그램밍 재료저장과 안전통신을위한 기술
CN103354998B (zh) 控制字保护
WO2001065762A2 (fr) Systeme d'acces conditionnel et procede permettant de prevenir des attaques ou des attaques de reexecution
EP2647213B1 (fr) Système et procédé d'enregistrement de contenu crypté présentant des conditions d'accès
KR20060101788A (ko) 컨텐트 보호를 위한 조건적 접속 방법 및 시스템
EP1161828B1 (fr) Utilisation amelioree des cartes a puce pour associer le contenu d'un support a des menages
JP4606584B2 (ja) 暗号化データを供給するシステム、暗号化データを暗号解読するシステムおよびこのような暗号解読システムに通信インタフェースを提供する方法
KR100526843B1 (ko) 디지털 컨텐츠 처리장치, 디지털 컨텐츠 처리시스템,디지털 방송시스템, 디지털 컨텐츠 처리방법,컴퓨터판독가능한 저장매체 및 컴퓨터 프로그램
WO2003073761A1 (fr) Procede de traitement de donnees chiffrees pour un premier domaine et reçues dans un reseau appartenant a un second domaine
WO2000041392A1 (fr) Systeme de distribution de paquets de contenu
WO2006036654A2 (fr) Procede et systeme permettant de realiser des codeurs-decodeurs securises

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 09880855

Country of ref document: US

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)