WO2009137247A2 - System and method for providing end-to-end content security - Google Patents

System and method for providing end-to-end content security Download PDF

Info

Publication number
WO2009137247A2
WO2009137247A2 PCT/US2009/040650 US2009040650W WO2009137247A2 WO 2009137247 A2 WO2009137247 A2 WO 2009137247A2 US 2009040650 W US2009040650 W US 2009040650W WO 2009137247 A2 WO2009137247 A2 WO 2009137247A2
Authority
WO
WIPO (PCT)
Prior art keywords
data streams
computer
network element
encryption technique
network
Prior art date
Application number
PCT/US2009/040650
Other languages
French (fr)
Other versions
WO2009137247A3 (en
Inventor
Lee R. Mckenna
Original Assignee
Guest-Tek Interactive Entertainment Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guest-Tek Interactive Entertainment Ltd. filed Critical Guest-Tek Interactive Entertainment Ltd.
Publication of WO2009137247A2 publication Critical patent/WO2009137247A2/en
Publication of WO2009137247A3 publication Critical patent/WO2009137247A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/103Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

A system and method for providing end-to-end content security in accordance with exemplary embodiments is disclosed. The method may include receiving, at a programmed receiver network element, one or more data streams from a satellite dish network element that is communicatively coupled to a network, securing the one or more data streams using one or more encryption techniques, and transmitting, to an edge switch network element, one or more secured data streams via the network.

Description

SYSTEM AND METHOD FOR PROVIDING END-TO-END CONTENT
SECURITY
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority to U.S. Provisional Application Ser. No.
61/045,105 filed April 15, 2008 entitled "System and Method of Providing End-to-End
Content Security," which is incorporated by reference herein in its entirety.
FIELD OF THE INVENTION
[0002] The present invention relates to systems and methods for providing end-to-end content security.
BACKGROUND INFORMATION
[0003] Recent developments in television technology may be responsible for an industry move from providing television programming to end-users using traditional broadcasting and/or cable formats to providing digital television programming to end-users using Internet
Protocol (IP) over a computer network infrastructure. Internet Protocol Television (IPTV) may provide many advantages over traditional television technologies, such as, the ability to integrate television with other IP-based services like high speed Internet access and Voice over Internet Protocol (VoIP). In addition, IPTV may offer end-users many advantages over traditional television technologies, such as, a more interactive and/or personalized television viewing experience through interactive programming guides, picture-in-picture, video on demand, and/or any other interactive and/or personalized television viewing feature provided by IPTV.
[0004] Despite these advantages, many companies associated with the hospitality industry
(e.g., management of hotels, management of motels, management of resorts, etc.) may consider previously established methods of providing digital television programming to one or more end user rooms using IPTV to be cost-prohibitive for wide spread adoption, require a significant amount of re-processing of signal and/or data streams, and/or fail to address end- to-end security concerns. For example, some of these companies may provide direct delivery of IPTV to one or more end-user rooms using a C-Band satellite and/or by feeding Multiple Service Operators (MSO) systems (e.g., Comcast, etc.) and/or Direct-to-Home (DTH) satellite systems into MPEG-2 real-time encoders. Unfortunately, many C-Band product offerings in the television marketplace may have limited access to popular premium programming (e.g., High Definition (HD) channels, etc.), may be delivered using large and bulky C-Band satellite dishes, and/or may be cost prohibitive. Ln addition, feeding MSO systems and/or DTH satellite systems into MPEG-2 real-time encoders may result in a degradation of video quality since the video content may go through one or more digital- to- analog-to-digital conversions and/or may be cost prohibitive. Further, none of these previously established methods of providing IPTV to one or more end-user rooms address security in a meaningful way end-to-end. SUMMARY OF THE INVENTION
[0005] At least one exemplary embodiment may provide a computer-implemented method for providing end-to-end content security. This embodiment may include receiving one or more video/audio streams from a satellite dish network element that is communicatively coupled to a network, securing the one or more video/audio streams using one or more encryption techniques associated with the network, embedding one or more watermarks into the one or more video/audio streams, and displaying the one or more video/audio streams on a display device that is communicatively coupled to the network. [0006] Another exemplary embodiment may also provide a computer-implemented method for providing end-to-end content security. This embodiment may include receiving one or more video/audio streams from a satellite dish network element that is communicatively coupled to a network, decrypting the one or more video/audio streams using a decryption method that is associated with a first encryption technique, encrypting the one or more video/audio streams using an encryption method that is associated with a second encryption technique, and providing the one or more video/audio streams to a re-encryptor network element that is communicatively coupled to the network.
[0007] Embodiments may also provide a computer-implemented method for providing end-to-end content security. These embodiments may include receiving one or more video/audio streams from a receiver network element that is communicatively coupled to a network, decrypting the one or more video/audio streams using a decryption method that is associated with a second encryption technique, determining if the one or more video/audio streams need additional encryption, encrypting the one or more video/audio streams using a encryption method that is associated with a third encryption technique based on a determination that the one or more videos streams need additional encryption, and providing the one or more video/audio streams to one or more viewer systems that are communicatively coupled to the network.
[0008] Embodiments may also provide a computer-implemented method for providing end-to-end content security. These embodiments may include receiving, at a programmed receiver network element, one or more data streams from a satellite dish network element that is communicatively coupled to a network, securing the one or more data streams using one or more encryption techniques, and transmitting, to an edge switch network element, one or more secured data streams via the network.
[0009] Embodiments may also provide a computer-implemented system for providing end-to-end content security. These embodiments may include a programmed receiver network element configured to receive one or more data streams from a satellite dish network element that is communicatively coupled to a network, a programmed re-encryptor network element configured to secure the one or more data streams using one or more encryption techniques, and a programmed core switch network element configured to transmit one or more secured data streams to an edge switch network element via the network.
[0010] Embodiments may also provide a computer-implemented method for providing end-to-end content security. These embodiments may include receiving, at a programmed set top box, one or more data streams from an edge switch network element that is communicatively coupled to a network, embedding one or more watermarks into the one or more data streams, and outputting, to a display device, the one or more data streams.
[0011] Embodiments may also provide a computer-implemented system for providing end-to-end content security. These embodiments may include a programmed set top box configured to receive one or more data streams from an edge switch network element that is communicatively coupled to a network, the programmed set top box configured to embed one or more watermarks into the one or more data streams, and a display device configured to output the one or more data streams.
[0012] These and other embodiments and advantages of the embodiments of the present invention will become apparent from the following detailed description, taken in conjunction with the accompanying drawings, illustrating by way of example the principles of the invention.
BRIEF DESCRIPTION QF THE DRAWINGS
[0013] Purposes and advantages of the exemplary embodiments will be apparent to those of ordinary skill in the art from the following detailed description in conjunction with the appended drawings in which like reference characters are used to indicate like elements, and in which:
[0014] Figure 1 illustrates a network topology for providing end-to-end content security, in accordance with exemplary embodiments; [0015] Figure 2 illustrates a method for providing end-to-end content security, in accordance with exemplary embodiments; and
[0016] Figure 3 illustrates an alternative embodiment of a network topology for providing end-to-end content security, in accordance with exemplary embodiments. [0017] These and other embodiments and advantages will become apparent from the following detailed description, taken in conjunction with the accompanying drawings, illustrating by way of example the principles of the various exemplary embodiments. DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS [0018] The description below describes elements of a network that may include one or more modules, some of which are explicitly shown in the figures, others that are not. As used herein, the term "module" may be understood to refer to computing software, firmware, hardware, and/or various combinations thereof. It is noted that the modules are exemplary. The modules may be combined, integrated, separated, and/or duplicated to support various applications. Also, a function described herein as being performed at a particular module may be performed at one or more other modules and/or by one or more other devices instead of and/or in addition to the function performed at the particular module. Further, the modules may be implemented across multiple devices and/or other components local or remote to one another. Additionally, the modules may be moved from one device and added to another device, and/or may be included in both devices.
[0019] The description below also describes physical and logical elements of a network, some of which are explicitly shown in figures, others that are not. The inclusion of some physical elements of a network system may help illustrate how a given network may be modeled. It should be noted, however, that all illustrations are purely exemplary and that the network scheme described herein may be performed on different varieties of networks which may include different physical and logical elements. [00201 For instance, network 100 from Figure 1 illustrates a simplified view of a network for providing end-to-end content security and various elements in the network. It is noted that other hardware and software not depicted may be included in network 100. It is also noted that network 100 illustrates a specific number of instances of network elements and/or network devices. It will be appreciated that a single instance and/or multiple instances of these entities may be included in a network.
[0021] It is further noted that the software described herein may be tangibly embodied in one or more physical media, such as, but not limited to, a compact disc (CD), a digital versatile disc (DVD), a floppy disk, a hard drive, read only memory (ROM), random access memory (RAM), as well as other physical media capable of storing software, and/or combinations thereof.
[0022] In an exemplary embodiment, a network for providing end-to-end content security may be disclosed. In various embodiments, a network for providing end-to-end content security may be implemented by one or more companies associated with the hospitality industry (e.g., management of hotels, management of motels, management of resorts, etc) and/or any other similarly situated vertical markets to provide end-to-end secure digital television programming to one or more end-user rooms using Internet Protocol Television (IPTV). A guest room (e.g., end-user room) may include a hotel room, a motel room, a hotel suite, a hotel conference center, a hotel business center, and/or any other end-user room that may be located at a site offering hospitality services that includes temporary housing and/or short-term occupancy (e.g., hospitals, universities, condominiums), hi various embodiments, television programming may include one or more HBO television programs, one or more ShowTime television programs, one or more ESPN television programs, and/or any other television program known by those of ordinary skill in the art. [0023] In an exemplary embodiment, the network may be configured to take advantage of the economies of scale and/or the relatively low cost of a Direct-to-Home (DTH) satellite delivery system, a cable company system, and/or a MSO system while maintaining a high level of video quality. A DTH satellite delivery system may include the delivery of satellite television broadcasts to an end-user via a satellite dish. In an exemplary embodiment, the end-to-end security features of the network may be configured to meet the content security requirements of one or more content suppliers, such as, one or more premium content suppliers (e.g., the HBO network, the ShowTime network, the ESPN network, etc.). [0024] In various embodiments, the network may employ one or more encryption/decryption techniques using one or more network elements to ensure that the content security requirements are met from end-to-end. For example, the network may be configured to encrypt one or more digital satellite broadcast video/audio streams transmitted from a satellite to a satellite dish (e.g., a remote head-end distribution facility, etc.) using a particular encryption technique, such as, the NagraStar encryption system. The NagraStar encryption system may include a conditional access system (CAS) in combination with the Advanced Encryption Standard (AES) (e.g., 128-bit encryption, etc.) that is used by those in the art to secure digital television programming and/or authorize one or more receivers to receive and/or display digital content. In another example, the network may be configured to encrypt one or more digital video/audio streams transmitted from one or more receivers to a re-encryptor network element using another encryption technique, such as, the Digital Transmission Copy Protection (DTCP) encryption system. The DTCP encryption system may include an encryption method that is well-known in the art that may be used to restrict "digital home" technologies (e.g., DVD players, televisions, etc.) by encrypting the interconnections between these technologies. In yet another example, the network may be configured to encrypt one or more digital video/audio streams transmitted from one or more re-encryptor network elements to one or more set top boxes (STBs) associated with one or more end-user rooms using yet another encryption technique, such as: the Verimatrix Video Content Authority System (VCAS) and/or the Pro:Idiom encryption system. The VCAS encryption system may include an encryption method that is well-known in the art that may use an AES {e.g., 128 bit encryption, etc.) to secure digital programming and authorize one or more STBs associated with one or more end-user rooms for the reception and/or display of digital content. The Pro:Idiom encryption system may include an encryption method that is well-known in the art that may use an AES {e.g., 128 bit encryption, etc.) to secure digital programming and authorize one or more STBs associated with one or more end-user rooms for the reception and/or display of digital content. In yet a further example, the network may be configured to encrypt one or more digital video/audio streams transmitted from one or more STBs to one or more display devices associated with one or more end-user rooms using yet a further encryption technique, such as, the High Definition Copy Protection (HDCP) encryption system. The HDCP encryption system may include an encryption method that is well-known in the art {e.g., widely accepted by consumer electronics manufacturers, widely accepted by content providers, etc.) that may used to secure digital content. [0025] In addition, the network may employ other security measures to ensure that the digital television programming received from one or more satellite broadcasts is not intercepted and/or compromised. In various embodiments, intercepting digital television programming may include an unauthorized retrieval of some and/or all of the digital television programming. In various embodiments, compromising digital television programming may include an unauthorized access to some and/or all of the digital television programming. [0026] Figure 1 illustrates a network 100 for providing end-to-end content security in accordance with exemplary embodiments. The network 100 may include one or more satellite network elements 102, one or more satellite dish network elements 104, one or more data networks 128, and/or one or more edge switch network elements 118. The network 100 may also include one or more secure head-end locations 106 associated with one or more receiver network elements 108, one or more re-encryptor network elements 110, one or more core switch network elements 116, one or more authorization servers 112, and/or one or more application servers 114. The network 100 may also include one or more end-user rooms 120 associated with one or more set top boxes (STBs) 122, one or more display devices 124, and/or one or more video record devices 126. The network 100 may also include one or more forensic recovery systems 134 associated with one or more watermark devices 132, one or more recovery devices 136, and/or one or more discovery devices 130. [0027] The network 100 may include one or more of a local area network (LAN), a virtual local area network (VLAN), a wide area network (WAN), the Internet, cellular networks, satellite networks, coaxial cable networks, and/or other networks that permit the transfer and/or reception of data. The network 100 may utilize one or more protocols of network elements. The network 100 may also translate to or from other protocols to one or more protocols of network elements, hi exemplary embodiments, the network 100 may include one or more of the exemplary networks recited above operating as a stand-alone network or in cooperation with each other. Use of the term network herein is not intended to limit the network to a single network and/or a single network type (e.g., a coax, an IP, a satellite, etc.).
[002S] The data network 128 may include one or more of a local area network (LAN), a virtual local area network (VLAN), a wide area network (WAN), the Internet, cellular networks, satellite networks, coaxial cable networks, and/or other networks that permit the transfer and/or reception of data. The data network 128 may utilize one or more protocols of network elements. The data network 128 may also translate to or from other protocols to one or more protocols of network elements. In exemplary embodiments, the data network 128 may include one or more of the exemplary networks recited above operating as a stand-alone network or in cooperation with each other. Use of the term network herein is not intended to limit the network to a single network and/or a single network type (e.g., a coax, an IP, a satellite, etc.).
[0029] Satellite network element 102 may be communicatively coupled to satellite dish network element 104 such that satellite dish network element 104 may receive one or more digital video/audio streams transmitted from the satellite network element 102 using network data path 138. A satellite network element 102 may include a satellite and/or a device with satellite-like technology features configured to transmit and/or broadcast one or more digital video/audio streams using network datapath 138. A satellite network element 102 may also include a cable network element associated with a cable network (e.g., a Hybrid Fiber-Coax (HFC) network, etc.) A satellite dish network element 104 may include a satellite dish and/or a device with satellite dish-like technology features configured to receive and/or distribute one or more digital video/audio streams transmitted from the satellite network element 102. A digital video/audio stream may include digital television programming (e.g., video signals, audio signals, MPEG-2 data streams, etc.) associated with one or more television networks, such as, HBO television programming, ShowTime television programming, ESPN television programming, and/or any other television programming well-known in the art. [0030] m various exemplary embodiments, the one or more digital video/audio streams may be encrypted using an encryption method (e.g., NagraStar, NDS, etc.) prior to the transmission of the one or more digital video/audio streams from the satellite network element 102. Accordingly, network 100 may provide one or more network elements associated with network 100 with access to one or more NagraStar decryption keys to be used to decrypt one or more NagraStar encrypted video/audio streams. [00311 The secure head-end location 106 may be a network room, multi-purpose room, and/or any other secure room associated with a network entrance point at a site associated with hospitality services. The secure head-end location 106 may contain and/or be communicatively coupled with one or more receiver network elements 108, one or more re- encryptor network elements 110, one or more core switch network elements 116, one or more authorization servers 112, one or more application servers 114, and/or any other network equipment enabling the provision of one or more digital/audio streams to one or more end- user rooms 120 associated with network 100.
[0032] Satellite dish network element 104 may be communicatively coupled to secure head-end location 106 and/or receiver network element 108 such that receiver network element 108 may receive one or more encrypted digital video/audio streams transmitted and/or distributed from the satellite dish network element 104 using network data path 140. [0033] The receiver network element 108 may include one or more receivers configured to receive one or more encrypted digital video/audio streams. For example, one or more receivers associated with receiver network element 108 may include one or more satellite tuners and/or one or more cable tuners. In various exemplary embodiments, one or more tuners may be configured to tune to one or more channels (e.g., static channels, etc.) to enable the reception of one or more encrypted digital video/audio streams. In various embodiments, one or more receivers associated with the receiver network element 108 may be authorized by an encryption system (e.g., NagraStar encryption system, etc.) employed by network 100 prior to receiving one or more encrypted digital video/audio streams. Authorizing a receiver may include a satellite network operator and/or a cable network operator authorizing a receiver using a unique identifier associated with the receiver. In exemplary embodiments, the satellite network operator and/or cable network operator may also transmit authorization messages that may be received by the receiver. An authorization message may include data that indicates which channels a receiver is authorized to tune to. [0034] The receiver network element 108 may include software and/or hardware configured to decrypt the one or more encrypted digital video/audio streams using one or more decryption keys (e.g., a NagraStar decryption key, etc.) provided by network 100. The receiver network element 108 may also include software and/or hardware configured to encrypt the one or more digital video/audio streams using another encryption method (e.g., the DTCP encryption method, etc.) associated with network 100 prior to outputting the one or more digital video/audio streams. In various exemplary embodiments, the receiver network element 108 may be configured to output the one or more encrypted digital video/audio streams to a re-encryptor network element 110 using one or more output ports (e.g., Ethernet ports, Firewire ports, Universal Serial Bus (USB) ports, etc.) associated with the receiver network element 108. In various exemplary embodiments, the receiver network element 108 may be configured to transmit the one or more encrypted digital video/audio streams using a particular protocol (e.g., User Datagram Protocol, etc.) over another particular protocol (e.g., Internet Protocol (IP), etc.) such that the one or more encrypted digital video/audio streams may be transmitted as one or more data packets (e.g., unicast packets, etc.). [0035] The re-encryptor network element 110 may include one or more integrated circuits (e.g., Field Programmable Gate Arrays (FPGAs), etc.) and/or one or more servers configured to receive and/or process one or more encrypted digital video/audio streams transmitted from the receiver network element 108 using network data path 142. In various exemplary embodiments, the re-encryptor network element 110 may include software and/or hardware configured to decrypt the one or more encrypted digital video/audio streams using one or more decryption keys (e.g., a DTCP decryption key, etc.) provided by network 100. [0036] In various exemplary embodiments, the re-encryptor network element 110 may include software and/or hardware configured to access one or more copy control information (CCI) bits associated with the one or more digital video/audio to determine if one or more of the digital video/audio streams need to be encrypted using an additional encryption system (e.g., VCAS encryption system, etc.) associated with network 100. CCI bits may include one or more bits associated with the one or more digital video/audio streams that may be used to determine if the one or more digital video/audio streams need additional security protection. Determining if one or more of the digital video/audio streams need to be encrypted may include accessing the CCI bits. In various embodiments, CCI bits of "00" maybe associated with one or more digital video/audio streams that may be copied freely. In various embodiments, CCI bits of "01" maybe associated with one or more digital video/audio streams that may be copied only once. In various embodiments, CCI bits of "10" may be associated with one or more digital video/audio streams that may not be copied any more. In various embodiments, CCI bits of "11" may be associated with one or more digital video/audio streams that may never be copied. If, for example, the re-encryptor network element 110 accesses one or more digital video/audio streams associated with CCI bits of "00," the re-encryptor network element 110 may determine that the one or more digital video/audio streams do not need to be encrypted. If, however, the re-encryptor network element 110 accesses one or more digital video/audio streams associated with CCI bits other than "00," the re-encryptor network element 110 may determine that the one or more digital video/audio streams need to be encrypted.
[0037] If, for example, the re-encryptor network element 110 determines that the one or more digital video/audio streams do not need to be encrypted using the additional encryption system (e.g., VCAS, etc.), the re-encryptor network element 110 may transmit the one or more digital video/audio streams to a core switch network element 116 using network data path 144. If, however, the re-encryptor network element 110 determines that the one or more digital video/audio streams need to be encrypted using the additional encryption system (e.g., VCAS, etc.), the re-encryptor network element 110 may communicate with the authorization server 112 to access one or more encryption keys (e.g., VCAS encryption keys, etc.) to be used to encrypt the one or more digital video/audio streams. In various exemplary embodiments, the re-encryptor network element 110 may be configured to output the one or more encrypted digital video/audio streams to a core switch network element 116 using one or more output ports (e.g., Ethernet ports, etc.) associated with the re-encryptor network element 110. In various exemplary embodiments, the re-encryptor network element 110 may be configured to transmit the one or more encrypted digital video/audio streams using a particular protocol (e.g., User Datagram Protocol, etc.) over another particular protocol (e.g., Internet Protocol (IP), etc.) such that the one or more encrypted digital video/audio streams may be transmitted as one or more data packets (e.g., multicast packets, etc.). [0038] It should be noted that the re-encryptor network element 110 may not be associated with an accessible bus. An accessible bus may include a data path that may be accessible by one or more systems that are external to network 100. It should also be noted that receiver network element 108 and re-encryptor network element 110 may be communicatively coupled using network data path 142 that is associated with a switched fast Ethernet private local area network (e.g., inside an equipment rack, etc.), a Firewire port, a USB port, and/or any other coupling mechanism such that network data path 142 is not associated with a direct connection to an external network (e.g., the Internet, a coaxial network, etc.).
[0039] The authorization server 112 may include software and/or hardware configured to store and/or provide one or more encryption keys (e.g., VCAS encryption keys, etc.) to the re- encryptor network element 110. The authorization server 112 may also include software and/or hardware configured to authorize one or more STBs 122 associated with one or more end-user rooms 120 and/or store and/or provide one or more decryption keys (e.g., VCAS decryption keys, etc.) to one or more authorized STBs 122 for the decryption and/or decoding of one or more encrypted digital video/audio streams. Authorizing one or more STBs 122 may include pre-authorizing one or more STBs 122 using one or more unique identifiers associated with one or more STBs 122, respectively. Pre-authorizing one or more STBs 122 may ensure that only the authorized STBs 122 may be allowed to decrypt one or more encrypted digital video/audio streams.
[0040] The application server 114 may include software and/or hardware configured to provide one or more software applications stored on the application server 114 to one or more network element and/or network devices associated with network 100. In various exemplary embodiments, the application server 114 may be configured to provide the one or more software applications to the core switch network element 116 using network data path 146. [0041] The core switch network element 116 may include software and/or hardware configured to receive and/or transmit the data outputted from one or more network elements associated with the secure head-end location 106 to the remainder of network 100. For example, the core switch network element 116 may be configured to receive one or more encrypted and/or decrypted digital video/audio streams from the re-encryptor network element 110 and transmit the one or more encrypted and/or decrypted digital video/audio streams to the remainder of network 100 via the edge switch network element 118. In another example, the core switch network element 116 may be configured to receive one or more authorization notifications {e.g., notification that one or more STBs have been authorized by an authorization server 112, notification that one or more STBs have not been authorized by an authorization server 112, etc.) and/or one or more decryption keys from the authorization server 112 and transmit the one or more authorization notifications and/or one or more decryption keys to one or more STBs 122 via the edge switch network element 118. In yet another example, the core switch network element 116 may be configured to receive data associated with one or more software applications from the application server 114 and transmit the data associated with one or more software applications to the remainder of network 100 via the edge switch network element 118.
[0042] In various exemplary embodiments, the core switch network element 116 may be configured to receive a request for authorization from one or more STBs 122, a request for decryption keys from one or more STBs 122, and/or any other data associated with network 100 from the edge switch network element 118. Accordingly, the core switch network element 116 may be configured to transmit a request for authorization from one or more STBs 122, a request for decryption keys from one or more STBs 122, and/or any other data associated with network 100 to the appropriate one or more network elements associated with the secure head-end location 106.
[0043] It should be noted that one or more core switch network elements 116 may be located in the secure head-end location 106 in one or more locked equipment cabinets. It should also be noted that the secure head-end location 106 and one or more end-user rooms 120 may be communicatively coupled using network data path 148 that is associated with a switched fast Ethernet private local area network (e.g., deployed inside a facility in one or more locked equipment rooms, etc.) such that the Ethernet private local area network is not associated with a direct connection to an external network (e.g., the Internet, etc.). [0044] The edge switch network element 118 may include software and/or hardware configured to receive data from the core switch network element 116 and/or transmit the data to one or more STBs 122. The edge switch network element 118 may also include software and/or hardware configured to receive data from one or more STBs 122 and/or transmit the data to one or more core switch network elements 116. In various exemplary embodiments, the edge switch network element 118 may maintain poit-to-port security for all data received and/or transmitted. In various exemplary embodiments, the edge switch network element 118 may be associated with a separate network, such as, a Virtual Local Area Network (VLAN) for the transmission of one or more digital video/audio streams.
[0045] The end-user room 120 may be a hotel room, a guest room, and/or any other room associated with a room for end-users at a site offering hospitality services that includes temporary housing and/or short-term occupancy (e.g., hospitals, universities, condominiums). The end-user room 120 may contain and/or be communicatively coupled with one or more STBs 122, one or more display devices 124, one or more video record devices 126, and/or any other network equipment enabling the provision of one or more digital video/audio streams to be viewed by an end-user using one or more display devices 124. [0046] The STB 122 may include a small, diskless, network element that may employ one or more system-on-chip (SOC) designs (e.g., Sigma 8634 chip-set from Sigma Designs, Inc., etc.). In various exemplary embodiments, the STB 122 may include software and/or hardware configured to tune to and/or receive one or more digital video/audio streams transmitted from the edge switch network element 116.
[0047] If, for example, the one or more digital video/audio streams are encrypted, the STB 122 may be configured to transmit one or more authorization requests to the authorization server 112. In various exemplary embodiments, the authorization server 112 may authorize the STB 122 and may transmit one or more decryption keys (e.g., a VCAS decryption key, etc.) to the STB 122 using network data path 144. Accordingly, the STB 122 may decrypt the one or more encrypted digital video/audio streams using one or more decryption keys (e.g., a VCAS decryption key, etc.) provided by the authorization server 112. [0048] In various exemplary embodiments, the STB 122 may include software and/or hardware to decode one or more digital video/audio streams transmitted from the edge switch network element 116. Decoding one or more digital video/audio streams may include transforming one or more digital video/audio streams into digital content which may be perceived by an end-user (e.g., a digital content viewer, a hotel guest, a motel guest, etc.) using a display device 124. The STB 122 may also include software and/or hardware configured to write and/or store the one or more digital video/audio streams into a memory component (e.g., a frame buffer, etc.) associated with the SOC of the STB 122 as the STB 122 decodes the one or more digital video/audio streams. In various exemplary embodiments, the STB 122 may also be configured to add one or more digital watermarks and/or one or more forensic watermarks (e.g., a Verimatrix VideoMark session based watermark, etc.) to the one or more digital video/audio streams for digital watermarking as the one or more digital video/audio streams are being written and/or stored into the memory component (e.g., the frame buffer, etc.) associated with the SOC of the STB 122. A digital watermark and/or a forensics watermark may include data that is embedded into one or more data signals, one or more video signals, one or more image signals, and/or one or more audio signals for the purpose of monitoring the data path of the one or more data signals, one or more video signals, one or more image signals, and/or one or more audio signals and/or identifying the originator and authorized user of the digital watermark and/or forensics watermark.
[0049] Watermarking (e.g., digital, forensics) may include the process of embedding information (e.g., a digital watermark, a forensics watermark) into a signal to monitor the signals data path. For example, an imperceptible digital watermark and/or forensics watermark may be embedded into one or more digital video/audio streams which may be recovered at a later time and may be used to determine when and/or where the one or more digital video/audio streams may have been viewed, hi various exemplary embodiments, a digital watermark and/or forensics watermark may not degrade after various transformations, such as, one or more analog-to-digital transformations and/or one or more digital-to-analog transformations. In various exemplary embodiments, a digital watermark and/or forensics watermark may be used to protect digital content from optical coupling and/or to detect when the digital content has been exposed to optical coupling. Optical coupling may include an unauthorized entity (e.g., an unauthorized company, an unauthorized device, an unauthorized person, etc.) using a recording device (e.g., a digital video camera, etc.) to record the video and/or audio output of a display device (e.g., a television, etc.).
[0050] The STB 122 may also include software and/or hardware configured to encrypt the one or more digital video/audio streams stored in the SOC using another encryption method (e.g., the HDCP encryption method, etc.) associated with network 100 prior to outputting the one or more digital video/audio streams. In various exemplary embodiments, the STB 122 may be configured to output the one or more digital video/audio streams to a display device 124 using one or more interfaces (e.g., a High Definition Multimedia Interface (HDMI), etc.) associated with the STB 122 and/or the display device 124. A display device 124 may include any device that may be used to view and/or perceive one or more digital video and/or audio streams.
[0051] By way of a non-limiting example, in various exemplary embodiments, the security measures disclosed herein may be applied to network 100 to detect optical coupling and/or illegal distribution of digital content as depicted in Figure 1. For example, a video record device 126 may be optically coupled to the display device 124 such that the video record device 126 may record the video and/or audio content outputted by the display device 124 without authorization. The video record device 126 may also distribute the recorded content to one or more destinations using a data network 128 (e.g., the Internet, etc.). If, for example, the discovery device 130 discovers an illegal copy of the recorded content, the recovery device 136 may be used to determine the source of the breach by accessing the digital watermark and/or forensics watermark associated with the recorded content and tracing the recorded content back to its origin and/or STB 122 using the watermark information.
[0052] In various exemplary embodiments, a discovery device 130 may include software and/or hardware configured to search for and/or locate one or more illegal copies of the digital content. In various embodiments, the discovery device 130 may be configured to search for and/or locate the one or more illegal copies of the digital content via a network (e.g., the Internet). In various exemplary embodiments, a recovery device 136 may include software and/or hardware configured to access and/or identify watermark information associated with the date, time, STB 122 serial number and/or other unique identifier, and/or any other information that may be used to identify the source and/or location of an information breach. In various exemplary embodiments, a watermark information may be used to trace the recorded content to a particular STB 122, a particular guest room, a particular time, and/or particular day associated with an information breach. [0053] It should be noted that the one or more digital video/audio streams may be associated with one or more MPEG-2 transport streams. Throughout the network 100, the header information and/or payload information associated with the one or more MPEG-2 transport streams may remain in tact throughout the one or more transmissions and/or the one or more receptions of the MPEG-2 transport streams associated with network 100. [0054] Figure 2 illustrates a method for providing end-to-end content security, in accordance with exemplary embodiments. This exemplary method is provided by way of example, as there are a variety of ways to carry out methods disclosed herein. The method 200 shown in Figure 2 can be executed or otherwise performed by one or a combination of various networks and/or network elements. The method 200 is described below as carried out by the network 100 shown in Figure 1 by way of example, and various elements of the network 100 are referenced in explaining the example method of Figure 2. Each block shown in Figure 2 represents one or more processes, methods, or subroutines carried in the exemplary method 200. Referring to Figure 2, the exemplary method 200 may begin at block 202.
[0055] In block 202, the method 200 may include the receiver network element 108 receiving one or more digital video/audio streams from the satellite dish network element 104 via the network data path 140. In various exemplary embodiments, the one or more digital video/audio streams may be received using one or more receivers associated with the receiver network element 108. Digital video/audio streams may include digital video content and/or digital audio content associated with one or more digital television program networks (e.g., HBO television network, ShowTime television network, ESPN television network, etc.). The method 200 may continue to block 204.
[0056] In block 204, the method 200 may include securing the one or more digital video/audio streams by employing one or more encryption/decryption techniques using one or more network elements. For example, the network 100 may encrypt one or more digital video/audio streams using a particular encryption technique, such as the NagraStar encryption system. In another example, the network 100 may encrypt one or more digital video/audio streams using another encryption technique, such as the Digital Transmission Copy Protection (DTCP) encryption system. In yet another example, the network 100 may encrypt one or more digital video/audio streams using yet another encryption technique, such as, the Verimatrix Video Content Authority System (VCAS). In yet a further example, the network 100 may encrypt one or more digital video/audio streams using yet a further encryption technique, such as the High Definition Copy Protection (HDCP) encryption system. The method 200 may continue to block 206. [0057] In block 206, the method 200 may include adding one or more digital watermarks and/or forensics watermarks to one or more digital video/audio streams to monitor the one or more digital video/audio streams data path. For example, an imperceptible digital watermark and/or forensics watermark may be embedded into one or more digital video/audio streams which may be recovered at a later time and may be used to determine when and/or where the one or more digital video/audio streams may have been viewed. The method 200 may continue to block 208.
[0058] hi block 208, the method 200 may include displaying the one or more digital video/audio streams on a display device 124. A display device 124 may include any device that may be used to view and/or perceive one or more digital video and/or audio streams. The method 200 may continue to block 210.
[0059] If, for example, one or more of the digital video/audio streams has been breached in block 210, the method 200 may recover the one or more digital video/audio streams and/or trace the one or more digital video/audio streams to one or more STBs 122 associated with network 100 in block 212. If, however, one or more of the digital video/audio streams have not been breached, the method 200 may end.
[0060] Figure 3 illustrates an alternative embodiment of a network topology for providing end-to-end content security, in accordance with exemplary embodiments. [0061] A computer-implemented method for providing end-to-end content security, comprising: receiving one or more video/audio streams from a satellite dish network element that is communicatively coupled to a network; securing the one or more video/audio streams using one or more encryption techniques associated with the network; embedding one or more watermarks into the one or more video/audio streams; and displaying the one or more video/audio streams on a display device that is communicatively coupled to the network. [0062] A computer-implemented method for providing end-to-end content security, comprising: receiving one or more video/audio streams from a satellite dish network element that is communicatively coupled to a network; decrypting the one or more video/audio streams using a decryption method that is associated with a first encryption technique; encrypting the one or more video/audio streams using an encryption method that is associated with a second encryption technique; and providing the one or more video/audio streams to a re-encryptor network element that is communicatively coupled to the network. [0063] A computer-implemented method for providing end-to-end content security, comprising: receiving one or more video/audio streams from a receiver network element that is communicatively coupled to a network; decrypting the one or more video/audio streams using a decryption method that is associated with a second encryption technique; determining if the one or more video/audio streams need additional encryption; encrypting the one or more video/audio streams using a encryption method that is associated with a third encryption technique based on a determination that the one or more videos streams need additional encryption; and providing the one or more video/audio streams to one or more viewer systems that are communicatively coupled to the network.
[0064] A system and method for providing end-to-end content security in accordance with exemplary embodiments is disclosed. The method may include receiving one or more video/audio streams from a satellite dish network element that is communicatively coupled to a network, securing the one or more video/audio streams using one or more encryption techniques associated with the network, embedding one or more watermarks into the one or more video/audio streams, and displaying the one or more video/audio streams on a display device that is communicatively coupled to the network. [0065] In the preceding specification, various preferred embodiments have been described with reference to the accompanying drawings. It will, however, be evident that various modifications and changes may be made thereto, and additional embodiments may be implemented, without departing from the broader scope of the invention as set forth in the claims that follow. The specification and drawings are accordingly to be regarded in an illustrative rather than restrictive sense.

Claims

Claims:
1. A computer-implemented method for providing end-to-end content security, comprising: receiving, at a programmed receiver network element, one or more data streams from a satellite dish network element that is communicatively coupled to a network; securing the one or more data streams using one or more encryption techniques; and transmitting, to an edge switch network element, one or more secured data streams via the network.
2. The computer-implemented method of claim 1, wherein receiving, at the programmed receiver network element, the one or more data streams further comprises receiving, at the programmed receiver network element, one or more encrypted data streams.
3. The computer-implemented method of claim 2, wherein the one or more encrypted data streams are encrypted using a first encryption technique.
4. The computer-implemented method of claim 3, wherein the first encryption technique comprises at least a NagraStar encryption technique.
5. The computer-implemented method of claim 3, further comprising decrypting the one or more encrypted data streams using one or more decryption keys associated with the first encryption technique.
6. The computer-implemented method of claim 1, wherein securing the one or more data streams further comprises encrypting the one or more data streams using a second encryption technique.
7. The computer-implemented method of claim 6, wherein the second encryption technique comprises at least a Digital Transmission Copy Protection (DTCP) encryption technique.
8. The computer-implemented method of claim 6, wherein securing the one or more data streams further comprises decrypting the one or more data streams using one or more decryption keys associated with the second encryption technique.
9. The computer-implemented method of claim 1, wherein securing the one or more data streams further comprises determining whether to encrypt the one or more data streams using a third encryption technique.
10. The computer-implemented method of claim 9, wherein the third encryption technique comprises a Verimatrix Video Content Authority System (VCAS) encryption technique.
11. The computer-implemented method of claim 9, wherein determining whether to encrypt the one or more data streams using the third encryption technique further comprises accessing one or more copy control information bits associated with the one or more data streams.
12. The computer-implemented method of claim 9, further comprising encrypting the one or more data streams using the third encryption technique.
13. The computer-implemented method of claim 1, wherein the programmed receiver network element comprises one or more receivers.
14. A computer-implemented system for providing end-to-end content security, comprising: a programmed receiver network element configured to receive one or more data streams from a satellite dish network element that is communicatively coupled to a network; a programmed re-encryptor network element configured to secure the one or more data streams using one or more encryption techniques; and a programmed core switch network element configured to transmit one or more secured data streams to an edge switch network element via the network.
15. The computer-implemented system of claim 14, wherein the programmed receiver network element is further configured to receive one or more encrypted data streams.
16. The computer-implemented system of claim 15, wherein the one or more encrypted data streams are encrypted using a first encryption technique.
17. The computer-implemented system of claim 16, wherein the first encryption technique comprises at least a NagraStar encryption technique.
18. The computer-implemented system of claim 16, wherein the programmed receiver network element is further configured to decrypt the one or more encrypted data streams using one or more decryption keys associated with the first encryption technique.
19. The computer-implemented system of claim 14, wherein the programmed receiver network element is further configured to encrypt the one or more data streams using a second encryption technique.
20. The computer-implemented system of claim 19, wherein the second encryption technique comprises at least a Digital Transmission Copy Protection (DTCP) encryption technique.
21. The computer-implemented system of claim 19, wherein the programmed re-encryptor network element is further configured to decrypt the one or more data streams using one or more decryption keys associated with the second encryption technique.
22. The computer-implemented system of claim 14, wherein the programmed re-encryptor network element is further configured to determine whether to encrypt the one or more data streams using a third encryption technique.
23. The computer-implemented system of claim 22, wherein the third encryption technique comprises a Verimatrix Video Content Authority System (VCAS) encryption technique.
24. The computer-implemented system of claim 22, wherein the programmed re-encryptor network element is further configured to determine whether to encrypt the one or more data streams using the third encryption technique by accessing one or more copy control information bits associated with the one or more data streams.
25. The computer-implemented system of claim 22, wherein the programmed re-encryptor network element is further configured to encrypt the one or more data streams using the third encryption technique.
26. The computer-implemented system of claim 14, wherein the programmed receiver network element comprises one or more receivers.
27. A computer-implemented method for providing end-to-end content security, comprising: receiving, at a programmed set top box, one or more data streams from an edge switch network element that is communicatively coupled to a network; embedding one or more watermarks into the one or more data streams; and outputting, to a display device, the one or more data streams.
28. The computer-implemented method of claim 27, further comprising decoding the one or more data streams.
29. The computer-implemented method of claim 28, wherein decoding the one or more data streams further comprises transforming the one or more data streams into digital content.
30. The computer-implemented method of claim 27, further comprising storing the one or more data streams on one or more memory components.
31. The computer-implemented method of claim 30, further comprising encrypting the one or more data streams that are stored on the one or more memory components using a fourth encryption technique.
32. The computer-implemented method of claim 31 , wherein the fourth encryption technique comprises a High Definition Copy Protection (HDCP) encryption technique.
33. A computer-implemented system for providing end-to-end content security, comprising: a programmed set top box configured to receive one or more data streams from an edge switch network element that is communicatively coupled to a network; the programmed set top box configured to embed one or more watermarks into the one or more data streams; and a display device configured to output the one or more data streams.
34. The computer-implemented system of claim 33, wherein the programmed set top box is further configured to decode the one or more data streams.
35. The computer-implemented system of claim 34, wherein the programmed set top box is further configured to decode the one or more data streams by transforming the one or more data streams into digital content.
36. The computer-implemented system of claim 33, wherein the programmed set top box is further configured to store the one or more data streams on one or more memory components,
37. The computer-implemented system of claim 36, wherein the programmed set top box is further configured to encrypt the one or more data streams that are stored on the one or more memory components using a fourth encryption technique.
38. The computer-implemented system of claim 37, wherein the fourth encryption technique comprises at least a High Definition Copy Protection (HDCP) encryption technique.
PCT/US2009/040650 2008-04-15 2009-04-15 System and method for providing end-to-end content security WO2009137247A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US4510508P 2008-04-15 2008-04-15
US61/045,105 2008-04-15

Publications (2)

Publication Number Publication Date
WO2009137247A2 true WO2009137247A2 (en) 2009-11-12
WO2009137247A3 WO2009137247A3 (en) 2010-11-11

Family

ID=41265282

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2009/040650 WO2009137247A2 (en) 2008-04-15 2009-04-15 System and method for providing end-to-end content security

Country Status (1)

Country Link
WO (1) WO2009137247A2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8903978B2 (en) 2011-06-14 2014-12-02 Sonifi Solutions, Inc. Method and apparatus for pairing a mobile device to an output device
US9107055B2 (en) 2011-06-14 2015-08-11 Sonifi Solutions, Inc. Method and apparatus for pairing a mobile device to an output device
US10291956B2 (en) 2015-09-30 2019-05-14 Sonifi Solutions, Inc. Methods and systems for enabling communications between devices
US10327035B2 (en) 2016-03-15 2019-06-18 Sonifi Solutions, Inc. Systems and methods for associating communication devices with output devices
US10602212B2 (en) 2016-12-22 2020-03-24 Sonifi Solutions, Inc. Methods and systems for implementing legacy remote and keystroke redirection
US10664624B2 (en) 2016-01-04 2020-05-26 Huawei Technologies Co., Ltd. Method and apparatus for controlling video output, and control circuit

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050097598A1 (en) * 2003-10-31 2005-05-05 Pedlow Leo M.Jr. Batch mode session-based encryption of video on demand content
US7155012B2 (en) * 2002-01-02 2006-12-26 Sony Corporation Slice mask and moat pattern partial encryption
US20070177761A1 (en) * 2000-03-18 2007-08-02 Levy Kenneth L Watermark embedding functions adapted for transmission channels

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070177761A1 (en) * 2000-03-18 2007-08-02 Levy Kenneth L Watermark embedding functions adapted for transmission channels
US7155012B2 (en) * 2002-01-02 2006-12-26 Sony Corporation Slice mask and moat pattern partial encryption
US20050097598A1 (en) * 2003-10-31 2005-05-05 Pedlow Leo M.Jr. Batch mode session-based encryption of video on demand content

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8903978B2 (en) 2011-06-14 2014-12-02 Sonifi Solutions, Inc. Method and apparatus for pairing a mobile device to an output device
US9107055B2 (en) 2011-06-14 2015-08-11 Sonifi Solutions, Inc. Method and apparatus for pairing a mobile device to an output device
US9369829B2 (en) 2011-06-14 2016-06-14 Sonifi Solutions, Inc. Method and apparatus for pairing a mobile device to an output device
US9854388B2 (en) 2011-06-14 2017-12-26 Sonifi Solutions, Inc. Method and apparatus for pairing a mobile device to an output device
US10244375B2 (en) 2011-06-14 2019-03-26 Sonifi Solutions, Inc. Method and apparatus for pairing a mobile device to an output device
US10291956B2 (en) 2015-09-30 2019-05-14 Sonifi Solutions, Inc. Methods and systems for enabling communications between devices
US11671651B2 (en) 2015-09-30 2023-06-06 Sonifi Solutions, Inc. Methods and systems for enabling communications between devices
US11330326B2 (en) 2015-09-30 2022-05-10 Sonifi Solutions, Inc. Methods and systems for enabling communications between devices
US10631042B2 (en) 2015-09-30 2020-04-21 Sonifi Solutions, Inc. Methods and systems for enabling communications between devices
US10664624B2 (en) 2016-01-04 2020-05-26 Huawei Technologies Co., Ltd. Method and apparatus for controlling video output, and control circuit
US10743075B2 (en) 2016-03-15 2020-08-11 Sonifi Solutions, Inc. Systems and methods for associating communication devices with output devices
US10327035B2 (en) 2016-03-15 2019-06-18 Sonifi Solutions, Inc. Systems and methods for associating communication devices with output devices
US11122318B2 (en) 2016-12-22 2021-09-14 Sonifi Solutions, Inc. Methods and systems for implementing legacy remote and keystroke redirection
US10602212B2 (en) 2016-12-22 2020-03-24 Sonifi Solutions, Inc. Methods and systems for implementing legacy remote and keystroke redirection
US11641502B2 (en) 2016-12-22 2023-05-02 Sonifi Solutions, Inc. Methods and systems for implementing legacy remote and keystroke redirection

Also Published As

Publication number Publication date
WO2009137247A3 (en) 2010-11-11

Similar Documents

Publication Publication Date Title
EP1787295B1 (en) Retrieval and transfer of encrypted hard drive content from dvr set-top boxes
US8208630B2 (en) Encryption and utilization of hard drive content
CA2437018C (en) Selective encryption to enable multiple decryption keys
CA2577328C (en) Retrieval and transfer of encrypted hard drive content from dvr set-top box utilizing second dvr set-top box
US9225761B2 (en) Distributed media-aggregation systems and methods to operate the same
US7773752B2 (en) Circuits, apparatus, methods and computer program products for providing conditional access and copy protection schemes for digital broadcast data
US20050169473A1 (en) Multiple selective encryption with DRM
US9055087B2 (en) Method and system for securely providing and storing content in a multiple dwelling unit system
TWI452888B (en) Method for protecting a recorded multimedia content
US10440409B2 (en) Method and device allowing an access control system to be applied to the protection of streamed video
WO2009137247A2 (en) System and method for providing end-to-end content security
US8631430B2 (en) Enabling DRM-encrypted broadcast content through gateway into the home
KR100745280B1 (en) Safe apparatus and method for broadcasting contents
KR101217225B1 (en) Broadcast processing apparatus and method thereof
JP2005523502A (en) Testing content in a conditional access system
KR100745281B1 (en) Safe apparatus and method for broadcasting contents
KR20070052120A (en) Broadcasting content protection system and method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09743234

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09743234

Country of ref document: EP

Kind code of ref document: A2