`Akins, III et al.
`
`(10) Patent N0.:
`
`(45) Date of Patent:
`
`US 6,744,892 B2
`*Jun. 1, 2004
`
`US006744892B2
`
`(54) METHOD AND APPARATUS FOR
`GEOGRAPHICALLY LIMITING SERVICE IN
`A CONDITIONAL ACCESS SYSTEM
`
`(58) Field of Search ............................... .. 380/239, 240,
`380/241, 242, 210
`
`(75)
`
`Inventors: Glendon L. Akins, III, Fort Collins,
`CO (US); Howard G. Pinder,
`Norcross, GA (US); Anthony J.
`\/Vasflewskj, Alpharenai GA (US)
`
`(73) Assignee: Scientific-Atlanta, Inc., Lawrenceville,
`GA (US)
`
`( * ) Notice:
`
`Subject. to any disclaimer, the term of this
`patent 1S extended or adjusted under 35
`USC, 154(1)) by 0 days,
`
`This patent is subject to a terminal dis-
`claimer.
`
`(21) Appl. No.2 10/377,416
`
`(22) Filed;
`
`Mar, 3, 2003
`
`(5 6)
`
`EP
`EP
`W0
`W0
`
`References Cited
`U S PATENT DOCUMENTS
`'
`'
`4,155,042 A
`4,358,672 A
`4,405,829 A
`
`5/1979 Permut et al.
`11/1982 Hyatt et al.
`.
`9/1983 Rivest et al.
`
`............. .. 340/7.5
`
`235/380
`............... .. 380/30
`
`330/1239
`7/1985 Wechselbefgef 6131-
`4>531>020 A
`7/1986 Thomas ..................... 340/3.74
`4,600,921 A
`
`........ .. 380/_239
`9/1986 Gilhousen et al.
`4,613,901 A
`gfigizi :
`2
`(List continued on next page.)
`FOREIGN PATENT DOCUMENTS
`
`0 723 371 A
`_
`0 752 786 A
`94 13107 A
`95 29560 A
`
`_ 1996
`//
`1/1997
`6/1994
`11/1995
`
`OTHER PUBLICATIONS
`
`(65)
`
`prior publication Data
`
`Us 2003/0169879 A1 Sep. 11,2003
`
`‘flnformation Technology—Oeneric
`ISO/IEC 31818-1,
`Coding of Moving Pictures and Associated Audio: Sys-
`terns!” Diaii NOV. 13, 1994.
`
`Related U.S. Application Data
`,
`,
`,
`,
`(63) Continuation of application No. 09/493,409, filed on Jan. 28,
`2000, now Pat. No. 6,560,340, which is a continuation of
`application No. 09/127,273, filed on .l1ll. 31, 1998, now
`abandoned» which is 3 °°n‘in”ati°n'in'Pa“ Of aPP1i°ati°n
`No. 09/111,958, filedonJul. 8, 1998, nowabandoned, which
`is a continuation—in—part of application No. 08/767,535, filed
`on Dec. 16, 1995, now pat. No. 5,005,938, which is a
`continuation—in—part of application No. 08/580,759, filed on
`ii lOI1-lI1- ar 0 3.
`1Ci1l0I1
`O.
`D
`C On
`I.
`,
`Di,” 2,9: 19?5>fn°W1.Patt; N°i\I5=8gi(3)/>i‘il17fl>6‘fg1i°fili is“ Conting‘
`i995, DOE; Pat.
`5,742,677.
`’
`’
`AP
`'
`Provisional application No. 60/054,575, filed on Aug. 1,
`1997, provisional application No. 60/054,578, filed on Aug,
`1, 1997; and PT0Vi5i°na1 aPP1i°ati0I1 N0~ 00/007,902, filed
`on De°'421995'
`2
`Int. Cl.’ .............................................. .. H04N 7/167
`
`(60)
`
`(51)
`
`(List C0f1tiI111ed OH next page.)
`Primary Examiner—Matthew Smithers
`'
`
`(57)
`
`ABSTRACT
`
`A cable television system provides conditional access to
`.
`Th
`bi
`t i
`.
`.
`t
`.
`i d
`h d
`d
`Servlcesfl
`6 Ca. ewe evlsloniisys em Inc 11 es a Ca en
`from which service instances , or programs, are broadcast
`and a plurality of set top units for receiving the instances and
`'
`'
`'
`'
`selectively decrypting the instances for display to system
`subscribers. The service instances are encrypted using pub-
`11C and/or Pr1)’at‘{ keys Pr0V1ded by Servlce Pr°V1der5 or
`central ‘clLll.ll0IlZ'cll.l0H agents. Keys used by the set tops for
`selective decryption may also be public or private in nature,
`and such keys may be reassigned at different
`times to
`provide a cable television system in which piracy concerns
`are minimized.
`
`(52) U.S. Cl.
`
`...................... .. 380/241; 380/239; 380/210
`
`38 Claims, 21 Drawing Sheets
`
`
`/7701
`
`,i0i,_T
`22074
`:1 13
`22114
`11s1< PARITY
`2213A
`MSK ID
`3315'
`CW PAW
`2217/“
`PARTY COUNT
`221957
`FREE PREWEW
`2221“
`COPY PROT. LEVEL
`2123~-
`BLACKOL_lfiSPOTL|GHT
`2225~
`11c.W1L£11£N1 101; ""'—
`,
`‘
`2229-,
`ALLOW IFFV.
`}\M'” W‘
`223%;
`DANCE, w1N00wTM
`"27
`2333:,
`111.12 310.1?
`_
`2235”
`CONTROL WOR
`COUNTER VALUE
`‘
`,
`2337~
`BLACKO T RADIUS
`' 121131.111/110
`2219:
`.1
`I
`2241»
`1 01111310
`5ME 2236
`_
`(“~44 _
`I
`2245
`ENE|[')lLgilT_Nl
`3
`2243
`
`'7
`
`2
`
`
`
`”
`"
`
`,1
`
`,
`
`7205
`MESSAGE 10
`
`05091171100 11110.
`\
`2209
`
`I
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:20)
`OpenTV Exhibit 1001
`Page 1
`
`
`
`US 6,744,892 B2
`Page 2
`
`US. PATENT DOCUMENTS
`
`........ .. 713/150
`6/1996 Augustine et al.
`9/1996 Ganesan ................... .. 380/282
`
`. 380/286
`9/1996 Lipner et al.
`.
`.............. .. 380/242
`9/1996 Easter et a1.
`10/1996 Easter et 31.
`.............. N 713,/191
`10/1996 Thibadeau et 31.
`. 330/240
`10/1996 Davis ............ ..
`.. 713/171
`10/1996 Eastlake, 3rd
`.. 713/181
`12/1996 Chang et a1.
`705/59
`12/1996 Bestler et ai.
`. 380/212
`4/1997 Bedmrek 6131,
`,,,,,,,,,,, N 725/35
`4/1998 Saito ......................... .. 705/52
`4/1998 pmdef et a1.
`. 380/242
`5/1998 Schipper et a1.
`. 713/176
`7/1998 Arnold
`713/175
`1/1999 Perlman ........... ..
`.. 713/162
`2/1999 Wasflewski et al
`_ 380,211
`12/1999 Banker et a1.
`............ .. 380/239
`12/1999 Bcdnarck at al.
`......... N 375/200
`8/2000 Rubin et a1.
`.............. N 375,/130
`
`
`
`.
`
`5,524,052 A
`5,557,678 A
`5,557,765 A
`5,559,889 A
`5,563,950 A
`5565909 A
`5,568,552 A
`5,568,554 A
`5,583,939 A
`5,590,202 A
`5,621,793 A
`5,740,246 A
`5,742,677 A
`5,764,770 A
`5,787,172 A
`5,862,220 A
`5,870,474 A
`6,005,938 A
`6,009,116 A
`6,103,305 A
`
`OTHER PUBLICATIONS
`
`ISO/IEC JTC1/SC29/WG11, “Universal Multi—Program
`Multiplex and Transport for MPEG—2 Systems”, Jan. 1993.
`ISO/IEC JTC1/SC29/WG11, “An MPEG—2 Multi—Program
`Multiplex Syntax”, Jan. 1993.
`ISO/IEC JTC1/SC20/WG11, “Requirements and Method
`f H. h_L
`IMUJI.
`1
`.
`f MPEG d Oth D.
`.I 1
`or
`.1g
`. We
`1.1’ exmg 0
`an
`er” lgl *1
`Service Bitstreams With Universal Transport Layer , Nov.
`1992-
`Whitfield, Dillie, “Authentication and Authenticated Key
`Exchanges”, DESIGNS, CODES AND CRYPTOGRAPHY
`An International Journal, vol. 2, No. 2, Jun. 1992, pp.
`107_125.
`-
`-
`-
`'
`.
`lsfhtnelelr’ lirluceftfippheddgrypthograghy SCeC°“d3§;1it31‘6’§
`‘O “O 5’
`8°“ ms’ a“ Our“
`0 6,1“
`’PP'
`'
`Menezes, Alfred J ., Handbook of Applied Crypthography,
`1311 506-523
`TM—1244 Rev. 4, Final Technical Report of the Conditional
`Access Specialist Group, Nov, 17, 1994,
`Coutrot et al., “A Single Conditional Access System for
`Satellite—Cable and Terrestrial TV,” IEEE Transactions on
`fgfffigéer Electronics, vol. 35, No. 3, Aug. 1989, pp.
`,
`~
`,
`,
`, “
`,
`Louis Claude Guillou and Jean—Luc Giachetti, Encipher-
`ment and Conditional Access,” SMPTE Journal, 103 Jun.
`(1994), N0. 6, White Plains, NY.
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:21)
`OpenTV Exhibit 1001
`Page 2
`
`4/1987 Hellman .................... .. 705/52
`
`12/1987 Frezza 6161-
`380/242
`............. .. 380/240
`4/1989 Hegendiirfer
`9/1989 Bennett et al.
`........... .. 380/239
`9/1989 Seth-Smith eta1-
`380/212
`12/1989 Takaragicta1-
`380/30
`3/1990 L66 6161-
`~~~~~ ~~
`380/239
`3/1990 Lee 6161
`705/71
`1/1991 Frezza et al.
`380/211
`2/1991 Piosenka 6161 ~~~~~~~~~~ ~- 713/186
`3/1991 Kauffman et al.
`........ .. 380/232
`5/1991 Takaragi et al.
`380/30
`7/1991 Gammie ....... ..
`380/228
`7/1991 1611615 61 61-
`310/172
`1/1992 Wright, Jr.
`....... ..
`725/34
`6/1992 Ta1ebaYaS111e1a1-
`-- 380/281
`9/1992 Ferraro ...................... .. 725/66
`10/1992 Wachob ..................... .. 725/35
`12/1992 Perlman
`380/30
`7/1993 Auld et al.
`............... .. 380/241
`8/1993 Anderson et al.
`........... .. 380/33
`3/1003 Gamm1ee1a1,
`330/228
`9/1993 Teare et al.
`380/250
`9/1993 Mihm, -I11
`380/249
`12/1993 Choi
`348/725
`1/1994 D9/JOY ~~~~ ~~
`380/208
`4/1994 Coutrot et al.
`............ .. 380/239
`8/1994 Wasilewski et ai.
`...... .. 380/212
`8/1994 Moore ............. N
`713/179
`1/1995 Beyers, ii etal.
`..
`.. 380/231
`1/1995 Gammie et a1,
`380/212
`3/1995 Wasilewski et al.
`380/212
`3/1995 Mih1I1,Jr.
`........ ..
`380/247
`5/1995 Handelman ............... .. 725/117
`5/1995 Wasilewski
`............... .. 370/426
`6/1995 Woo et ai.
`......
`380/212
`7/1995 Thibadeau etal.
`..... .. 725/35
`8/1995 Augustine et al.
`........ H 713/161
`11/1995 Matsumoto et a1.
`713/176
`12/1995 Davis .............. ..
`705/59
`1/1996 Logston et al.
`.
`725/131
`1/1996 F0“ 9101-
`- - - - - - -- -
`- - - -- 380/'30
`Iljleszifieatrglet 31'
`371996 Fyiedman
`3/1996 Cooper ......... ..
`4/1996 Sheldflck et al.
`4/1995 Monnin
`5/1996 Woo et al.
`
`
`
`
`
`713/179
`380/270
`380/212
`380/229
`................ .. 725/137
`
`
`
`4,658,093 A
`4,712,239 A
`4,823,385 A
`4,864,615 A
`4,866,770 A
`4,885,777 A
`RE33,189 E
`4912762 A
`4,982,430 A
`4,993,068 A
`5,003,591 A
`5,018,196 A
`5,029,207 A
`5,036,537 A
`RE33,808 E
`5,124;117 A
`5,151,782 A
`5,155,591 A
`5,175,765 A
`5,231,665 A
`5,235,643 A
`5,237,610 A
`5,243,652 A
`5,249,230 A
`5,270,822 A
`512329248 A
`5,301,233 A
`5,341,425 A
`5,343,527 A
`5,381,477 A
`5,381,481 A
`5,400,401 A
`5,402,490 A
`5,414,773 A
`5,420,866 A
`5,425,101 A
`5,432,542 A
`5,440,633 A
`5,465,299 A
`5,473,692 A
`5,481,542 A
`5:481:53 A
`2
`5,409,294 A
`5,499,295 A
`5,506,904 A
`5,509,073 A
`5,519,780 A
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 1 of 21
`
`US 6,744,892 B2
`
`zo_£§§.8_/SE28223;:32.M8zEmz_
`
`
`:5E.
`
`
`
`.50.2,23
`
`2?x
`
`E
`
`m:
`
`5252:N:
`
`FjzozzaoE2:EB.'2.
`
`
`
`2.Ias:32E
`
`fljvmii.11
`HW32.N1
`.VNmiwX2,§.%_:.§my
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:22)
`E
`M.P
`
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 2 of 21
`
`US 6,744,892 B2
`
`N-omL:
`
`1:;
`
`2<zo:azou
`
`mmmou<
`
`w\mw.mV\_\
`
`_¢»zQzmxmz
`
`2<:o:
`
`4
`
`wm:_<zgm
`
`V
`
`
`
`25;szzs
`
`Egéaz
`
`.2E55
`
`
`
`5:32o%%,n<.~_%~_%oQ
`
`mom
`
`4_>m4_m_
`
`zozmymuzm
`
`
`
`Am)”;tam
`
`zo:m»mQzm
`
`4m>m2u_m
`
`zo:l»mQzm
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:23)
`OpenTV Exhibit 1001
`Page 4
`
`
`
`
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 3 of 21
`
`US 6,744,892 B2
`
`5_>Em
`
`SN
`
`mm63
`
`32
`
`§E_::_§
`‘l
`
`we
`
`SN
`
`ExE<>_E
`
`225229,:
`
`.02,_<_§52:.
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:24)
`OpenTV Exhibit 1001
`Page 5
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 4 of 21
`
`US 6,744,892 B2
`
`ms
`
`.mz<m_
`
`2:3:
`
`sagaE3:53
`
`
`
`inmofimmzEV2235:E4.52E
`222%92%
`32>22,1
`E589s_EmE282c
`
`322>28Kmago;
`
`
`
`
`
`5528zo_E_=§_s<zo__§EIs<E28zo_:§Eam
`
`mzoEN_%I5<2%Exzo_mmm_:§
`
`
`
`EIezo_E§535
`
`mm
`
`In
`
`SJ
`
`3_:3Q2;91mzo_E_§s<2%Exzo_mam_:§
`
`
`
` %zo_:2_%a:2?
`
`.0mt
`
`am
`
`E,2zo_:§Ewe
`E27?AmEaa<zo_m2;E43%::12,.E55:1K
`
`I:I1IIIII:III1I1IIIIIIIIJ
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:25)
`OpenTV Exhibit 1001
`Page 6
`
`
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 5 of 21
`
`US 6,744,892 B2
`
`83458
`
`%E:_::
`
`.Ez_
`
`Ev
`
`Ev
`
`
`
`zo_§§_o§Em
`
`WA
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:26)
`OpenTV Exhibit 1001
`Page 7
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 6 of 21
`
`US 6,744,892 B2
`
`r_.
`an
`3:
`Z
`
`"\.;<‘J
`Fr)
`7*’)
`no
`2
`
`rra
`no
`no
`
`ix
`—
`“D
`
`7
`
`5,
`31
`"‘
`Ln
`
`.
`‘
`K:
`
`503
`
`
`
`8
`Ln
`
`2an
`
`Ln
`__
`Lo
`
`§LAJ
`9:0
`
`9’|...1
`2
`
`32'
`»—:,~
`255
`cx_:
`Q:
`(f)’__
`Z:/)
`§<(
`-$
`2
`
`2
`
`“:5
`f5’<£
`|._lJ
`CLO:
`C3-<1:
`D:
`E
`E
`
`SERVICEINFRASTRUCTURE
` Ln
`
`3Lra
`
`511
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:27)
`OpenTV Exhibit 1001
`Page 8
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 7 of 21
`
`US 6,744,892 B2
`
`$8
`
`5%:
`
`§
`
`E
`
`5%
`
`
`
`5:8::32.33Re
`
`
`.Qo2mgxmmo
`Ezz8§z_
`
`zfi
`
`mm
`
`SEQ
`
`.om_zoQ
`
`am20.35:
`
`mzgmzo:Q<z<m_
`
`mg>mQ
`
`mg
`
`xmwfimz
`
`E.8:E0E
`
`\
`
`to
`
`2225:
`
`Vaozbz
`
`5:82Em
`
`5:8:mm;
`
`:355%
`
`ESEzo_sm_%a
`
`3
`
`
`
`§E3$_H.::55
`
`55$zoEa_§a
`
`Zc
`
`58:
`
`53%
`
`so
`
`
`
`
`
`55:Em_>_dQ252%355
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:28)
`OpenTV Exhibit 1001
`Page 9
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 8 of 21
`
`US 6,744,892 B2
`
`o.o
`
`«.-
`
`3%AEA
`3::
`
`
`
`Auvmo_...
`
`NON_:¢_:o
`
`
`Eva:
`
`Z0XEEmm
`
`XEE
`
`5VASEmm
`
`5XEE_mm
`
`:2xE~:mm
`
`XEEMmm
`
`23:;
`
`
`
`32:3%;EVGEJ
`
`F89>
`
`2:
`
`E59;
`
`En:
`
`/
`
`2/
`
`Q25%aoazs:TE:
`
`
`
`2%§-I§§Ea:agmzé
`
`32:
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:20)(cid:19)
`OpenTV Exhibit1001 Page10
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 9 of 21
`
`US 6,744,892 B2
`
`28%fi§_E5
`m:E13
`
`3
`
`canazéN18;
`
`5::25%
`
`5:325
`
`E:
`
`mDE
`
`
`
`
`
`_\_\\\\\%\xxxxx\
`
`Swk
`
`\
`
`\\
`
`\\
`
`E[Lgm
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:20)(cid:20)
`OpenTV Exhibit 1001
`Page 11
`
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 10 of 21
`
`US 6,744,892 B2
`
`
`
`
`
`m_w¥U<¢_molwz<mHN-om&2
`
`
`
`
`
`_..._233_ ////momk\>//37.//Ex\_E5:2.:95::
`
`zo:Qmm.u_<>E¢-<U
`
`Q<oA»<l
`
`\,,87_\
`,Q4m__-mwHz_om
`
`I22
`
`::E
`
`
`
`/M/,/is_x</
`
`22E
`
`\X,
`\\//§\\
`
`/n//x////////:8H82/////4\\8o_/ éméiaE314
`
`
`
`
`,2///wax/__
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:20)(cid:21)
`OpenTV Exhibit 1001
`Page 12
`
`
`
`
`U.S. Patent
`
`J
`
`US 6,744,892 B2
`
`2gm\x\
`
`<H<QzzmmN__
`
`5://0:2:/3:_x\\2:4\\/\m,::zo_E_EIs<322233:Q855%23$3:
`
`
`5&3;W//_v_5Na3§//,:4//4x
`
` ,,\m/74,2\_x\:2:22m///,/_,\xxasg_mz_E:2:W//,,/,/.\_.x2:x1:.\351$x2:%£2:E2:oz_%%Mxi:3522:E5:2:
`
`
`\$2:EasTag.x-:_mz_;5
`/,/7:,,,.‘\\\mo:\\\\
`x//2:
`
`
`
`mo__+m___+m___uN___zzw
`
`
`
`zo_<Q:zmI_:<Qwzoa
`
`mwbym
`
`mo<mmmz«Q
`
`woqmmmz22¢«Q
`
`.21\\
`
`mo<mmm:<0
`
`mmo<mI
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:20)(cid:22)
`OpenTV Exhibit1001 Page13
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 12 of 21
`
`US 6,744,892 B2
`
` INTERFACE
`
`TO DHCT
`
`1203
`
`1201
`
`12m
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:20)(cid:23)
`OpenTV Exhibit1001 Page14
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 13 of 21
`
`US 6,744,892 B2
`
`
`
`W
`
`FIG 1 3
`'
`
`swore/101
`
`“I331
`
`1329
`
`, ADMIN.
`31012401
`1330
`1313525
`
`’
`
`EA ADMIN. EMM c00£
`CAA EMM 0001
`
`'_" 0
`
`1313
`
`I
`
`CELL TYPE
`
`CELL NAME
`
`NEXT ELEM.
`
`EA ID
`
`CAA FLAGS
`
`HRST NVSC
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:20)(cid:24)
`OpenTV Exhibit 1001
`Page 15
`
`::::::::EEE@]§3§(rD::::::_
`
`0000 FOR omare CA 05331003
`
`NVA
`31012/105 <
`
`1303
`
`5
`
`,
`
`R0
`3101005
`/
`
`1301
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 14 of 21
`
`US 6,744,892 B2
`
`
`
`-/1502 “
`1:11
`
`1605*
`
`
`1607
`
`1609/
`1511»
`
`NO EXP. DATE
`
`EVEN MSK
`ODD MSK
`
`MSK
`1608
`
`N0 EXP. DATE
`
`ENTITLEMENT-ID
`
`EXP. DATE
`
`
`
`>F[G.]6
`
`
`
`1703
`
`EVENT DESCRIPTOR
`
`FIG]?
`
`EVENT NVSC W
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:20)(cid:25)
`OpenTV Exhibit1001 Page16
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 15 of 21
`
`US 6,744,892 B2
`
`/
`
`//
`
`CAEMESSAGE
`,¢/
`
`(AWS
`CA_GBAM_MESSAGE
`
`1
`
`1
`
`/
`
`1
`
`1
`
`(/805
`
`\\
`
`\\
`
`‘Q54
`I
`
`\
`
`\
`
`‘A
`
`Ix
`
`\
`
`..
`
`,~~
`
`,.
`
`’’_‘’_,.——’'’'T\
`
`/
`
`////
`°AH%§3§§°5|
`1003
`
`/
`
`/
`
`GLOBAL_BROADCAST_AUTHENHCATED_MESSAGE1
`
`\\\\
`\
`
`\\
`
`\\
`GLOBAL_BROADCAST_DATA
`
`1809
`
`1 GBAM 1801=1803+1805
`1m§‘\\
`GBAM MAC
`MD5
`ECM MACINPUT
`
`|
`
`\
`
`1
`
`\
`
`\
`
`/ /
`
`/
`
`/
`
`1/2 MSK
`1015
`
`l7[C?.]é3
`
`GBAM_HEADER 1
`
`1807
`
`
`
`1
`
`1903
`
`1907
`
`1909
`1911
`
`
`
`1917
`1919
`
`CA SYSTEM ID
`GBAM TAG
`
`MSK PARDY
`MSK SELECT
`
`COMMAND CODE
`
`EMEDLEMEME-ID
`FLAGS
`_
`N0.0F MODES
`
`1901
`
`‘
`
`
`
`
`
`
`
`
`
`
`
`1921
`
`MODE MGHE To copy
`
`1923
`1925
`1927
`
`1929
`
`
`
`
`
`EARLTEST START
`LATEST END
`MDDE LENGTH
`MDDE COST
`
`PURCHASEABLE ENTHLEMENT DATA 1 13 E,
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:20)(cid:26)
`OpenTV Exhibit1001 Page17
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 16 of 21
`
`US 6,744,892 B2
`
`APPLICATION APPLICATION DATA + GBAM
`
`CLIENT
`
`2009
`
`2205
`
`:}JAESSA°E m
`
`‘
`
`050010000 INFO.
`
`2209
`
`EVENT W0‘
`2227
`
`BLACK°”T/
`SPOTUGHTINFO.
`2236
`ENTHLEMENT
`\
`10 BH
`2243
`
`2203
`
`
`A
`CA MESSAGE TAG
`CA SYSTEM ID
`
`2207
`
`2211
`
`2213
`2215
`2217
`
`2219
`
`2221
`
`2223
`
`2225
`
`PARHY COUNT
`
`
`
`2229
`2231*
`2233
`2235
`
`
`ALLOW IPPV.
`CANCEL WINDOW
`005 STAMP
`CONTROL WORD COUNTER VALUE
`
`
`BLACKOUT RAWUS
`2237
`
`2239
`x CENTROW
`2241
`Y CENTR0m
`
`ENTHLEMENTID
`
`
`
`l77(?,éé
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:20)(cid:27)
`OpenTV Exhibit 1001
`Page 18
`
`
`
`U.S. Patent
`
`7
`
`US 6,744,892 B2
`
`
`
`No_N+mo_N+mo_Nu_o_Nz¢_
`
`mo_N
`
`mow
`
`wo<mmw:<9
`
`\
`
`\
`
`\
`
`\
`
`
`
`
`
`.zo_E_:Es<sea:WM32%E55;E5saw:5
`
`
`
`0////mm/./,¢¥_uI,,/by/ax4w<mm\\moo_//{mm
`
`
`
`
`1E5:was5%:wozaea2:Eoz_zo_mESE52:E22:EEEEh//-\\\\\\\sma,//,1X\\EEcan?EN//,\\\EasEM2:/E:E73:
`
`mmGE28:
`
`2;
`
`//\\\/_¥\_\\//\_
`
`n.\\32\\A:3MRa\\\2://,EN_‘xEN2;WEN
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:20)(cid:28)
`OpenTV Exhibit 1001
`Page 19
`
`
`
`
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 18 of 21
`
`US 6,744,892 B2
`
`/2
`2303 AUTHENTICATION
`W
`NF
`
`AID
`
`SD
`
`2307
`
`2309
`
`CODE
`
`E
`
`M2
`
`D‘Ill1|wYm
`
`2
`
`Ln
`
`
`
` 1Il‘III|IIl.|.ITIIT7.0mL_T;LTIIIIIIIIIII.TTT2MW.r__MJ!III!II!I
`l|4l_I_1.|
`
`[.[FF5___.mI.JL
`4|.IIIIIIIIIIILIII___«M___./|\.___I___M_3__W_____1:__
`
`50 51 52535455 565758 59 60 61 62
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:21)(cid:19)
`OpenTV Exhibit1001
`Page 20
`
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 19 of 21
`
`US 6,744,892 B2
`
`
`_EN.
`
`QB45QH51Q55_r\,\\mm<mzsfim
`
`r\3:2:5:
`
`_ _
`
`NE
`
`22:
`
`as:5
`
`piE.§s_aEE3:
`
`2:5E.2:5%[E3:55
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:21)(cid:20)
`OpenTV Exhibit1001
`Page 21
`
`22
`
`so:52:EN2
`
`
`
`mmqmz¢_
`
`22:283SE28
`
`:55
`
`m_4N
`
`3%
`
`
`
` 3:39E£22833:<5movmmovm
`
`
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 20 of 21
`
`US 6,744,892 B2
`
`hf)
`(\J<2-
`C\l
`
`:2
`
`:5
`
`S3
`
`Q3
`
`8Q:
`
`mommuE252
`
`
`
`Nlofl..2z_5
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:21)(cid:21)
`OpenTV Exhibit1001
`Page 22
`
`
`
`
`
`U.S. Patent
`
`Jun. 1, 2004
`
`Sheet 21 of 21
`
`US 6,744,892 B2
`
`GEO—POLlT|CAL
`CA SIGNATURE
`,
`
`2807
`
`391
`
`I
`
`\
`
`\ \
`
`OPERATOR
`\ CHAIN
`\ \ \
`
`\
`
`\
`
`‘ x \
`
`$GNATURE
`
`OPERATOR RN
`W
`
`OPERATOR #1
`EAN AN
`SIGNATURE
`
`OPERATOR #N
`EA #1
`SIGNATURE
`
`DHCT
`Cf”/'N / ’ T T
`I
`T \ \ \
`2/804
`J
`ROOT CAA
`
`SIGNATURE
`N
`
`
`5 \ \
`
`
`OPERATOR #1
`CAA SIGNATURE
`
`
`
`
`
`OPERATOR #1
`EA #1
`SIGNATURE
`
`
`
`—
`
`
`
`J
`
`DHCT SET TOP
`STGNATURE
`
`
`
`
`EMM GENERATOR
`
`ROOT CAA PWVATE KEY
`
`OPERATOR CAA
`PUBUC KEYS
`
`
`
`CAA
`DHCT
`INTRODUCTORY
`CERTIFICATES
`EMME
`(PUBLIC KEYS)
`
`F1029
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:21)(cid:22)
`OpenTV Exhibit1001
`Page 23
`
`
`
`US 6,744,892 B2
`
`1
`METHOD AND APPARATUS FOR
`GEOGRAPHICALLY LIMITING SERVICE IN
`A CONDITIONAL ACCESS SYSTEM
`
`RELATED PATENT APPLICATIONS
`
`The present application is a continuation of U.S. patent
`application Ser. No. 09/493,409 filed Jan. 28, 2000 now U.S.
`Pat. No. 6,560,340, recently allowed, which is a continua-
`tion of U.S. patent application Ser. No. 09/127,273, filed Jul.
`31, 1998, now abandoned, which claims the benefit of U.S.
`provisional application serial No. 60/054,575, filed Aug. 1,
`1997, and is a CIP of US. patent application Ser. No.
`09/111,958, filed Jul. 8, 1998, now abandoned, which claims
`the benefit of U.S. provisional application serial No. 60/054,
`578,
`filed Aug. 1, 1997, and is a CIP of U.S. patent
`application Ser. No. 08/767,535, filed Dec. 16, 1996, now
`U.S. Pat. No. 6,005,938, and is a CIP of U.S. patent
`application Ser. No. 08/580,759, filed Dec. 29, 1995, now
`U.S. Pat. No. 5,870,474, which claims the benefit of U.S.
`provisional application serial No. 60/007,962, filed Dec. 4,
`1995, and is a C11’ of Us. patent application Ser. No.
`08/415,617, filed Apr. 3, 1995, now U.S. Pat. No. 5,742,677.
`The present application is further one of seven applica-
`tions with an identical Detailed Description. All of these
`applications have the same priority date and all have the
`same assignee. The serial numbers and filing dates are as
`follows:
`
`U.S. patent application Ser. No. 09/487,076, filed on Jan.
`19, 2000, now U.S. Pat. No. 6,292,568, which claims
`priority to US. patent application Ser. No. 09/126,783,
`filed Jul. 31, 1998, which is presently abandoned;
`U.S. patent application Ser. No. 09/126,921, filed on Jul.
`31, 1998, now U.S. Pat. No. 6,157,719;
`U.S. patent application Ser. No. 09/488,230, filed on Jan.
`20, 2000, now U.S. Pat. No. 6,252,964, which claims
`priority to U.S. patent application Ser. No. 09/127,352,
`filed Jul. 31, 1998, which is presently abandoned;
`U.S. patent application Ser. No. 09/488,104, filed on Jan.
`20, 2000, now U.S. Pat. No. 6,246,767, which claims
`priority to U.S. patent application Ser. No. 09/127,152,
`filed Jul. 31, 1998, which is presently abandoned;
`U.S. patent application Ser. No. 09/464,794, filed on Dec.
`16, 1999, now U.S. Pat. No. 6,424,717, which claims
`priority to U.S. patent application Ser. No. 09/126,888,
`filed Jul. 31, 1998, which is presently abandoned; and
`U.S. patent application Ser. No. 09/126,795, filed on Jul.
`31, 1998, now U.S. Pat. No. 6,105,134.
`
`FIELD OF THE INVENTION
`
`The invention concerns systems for protecting informa-
`tion and more particularly concerns systems for protecting
`information that is transmitted by means of a wired or
`wireless medium against unauthorized access.
`
`BACKGROUND OF THE INVENTION
`
`One way of distributing information is to broadcast it, that
`is, to place the information on a medium from which it can
`be received by any device that is connected to the medium.
`Television and radio are well-known broadcast media. If one
`
`wishes to make money by distributing information on a
`broadcast medium, there are a couple of alternatives. Afirst
`is to find sponsors to pay for broadcasting the information.
`A second is to permit access to the broadcast information
`only to those who have paid for it. This is generally done by
`
`2
`broadcasting the information in scrambled or encrypted
`form. Although any device that is connected to the medium
`can receive the scrambled or encrypted information, only the
`devices of those users who have paid to have access to the
`information are able to unscramble or decrypt the informa-
`tion.
`
`A service distribution organization, for example a CATV
`company or a satellite television company, provides its
`subscribers with information from a number of program
`sources, that is, collections of certain kinds of information.
`For example, the History Channel is a program source that
`provides television programs about history. Each program
`provided by the History Channel is an “instance” of that
`program source. When the service distribution organization
`broadcasts an instance of the program source, it encrypts or
`scrambles the instance to form encrypted instance. An
`encrypted instance contains instance data, which is the
`encrypted information making up the program.
`An encrypted instance is broadcast over a transmission
`medium. The transmission medium may be wireless or it
`may be “wired”, that is, provided via a wire, a coaxial cable,
`or a fiber optic cable. It is received in a large number of set
`top boxes. The function of set-top box is to determine
`whether encrypted instance should be decrypted and, if so,
`to decrypt it to produce a decrypted instance comprising the
`information making up the program. This information is
`delivered to a television set. Known set top boxes include
`decryptors to decrypt the encrypted instance.
`Subscribers generally purchase services by the month
`(though a service may be a one-time event), and after a
`subscriber has purchased a service, the service distribution
`organization sends the set
`top box belonging to the sub-
`scriber messages required to provide the authorization infor-
`mation for the purchased services. Authorization informa-
`tion may be sent with the instance data or may be sent via
`a separate channel, for example, via an out—of—band RF link,
`to a set top box. Various techniques have been employed to
`encrypt the authorization information. Authorization infor-
`mation may include a key for a service of the service
`distribution organization and an indication of what programs
`in the service the subscriber is entitled to watch. If the
`authorization information indicates that
`the subscriber is
`
`entitled to watch the program of an encrypted instance, the
`set-top box decrypts the encrypted instance.
`It will be appreciated that “encryption” and “scrambling”
`are similar processes and that “decryption” and “descram-
`bling” are similar processes; a dilference is that scrambling
`and descrambling are generally analog in nature, while
`encryption and description processes are usually digital.
`The access restrictions are required in both analog and
`digital systems. In all systems, the continued technological
`improvements being used to overcome the access restric-
`tions require more secure and flexible access restrictions. As
`more systems switch from an analog format to a digital
`format, or a hybrid system containing both analog and
`digital formats, flexible access restrictions will be required.
`Restricting access to broadcast information is even more
`important for digital information. One reason for this is that
`each copy of digital information is as good as the original;
`another is that digital information can be compressed, and
`consequently, a given amount of bandwidth carries much
`more information in digital form; a third is that the service
`distribution organizations are adding reverse paths which
`permit a set-top box to send a message to the service
`distribution organization, thereby permitting various inter-
`active services.
`
`10
`
`15
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`(cid:50)(cid:83)(cid:72)(cid:81)(cid:55)(cid:57)(cid:3)(cid:3)(cid:3)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:19)(cid:20)(cid:3)(cid:3)(cid:3)(cid:3)(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:21)(cid:23)
`OpenTV Exhibit1001
`Page 24
`
`
`
`US 6,744,892 B2
`
`3
`Thus, the service distribution organizations require access
`restrictions which are both more secure and more flexible
`
`4
`DETAILED DESCRIPTION OF A PREFERRED
`EMBODIMENT
`
`than those in conventional systems
`BRIEF DESCRIPTION OF THE DRAWING
`
`FIG. 1 is a block diagram of a conditional access system;
`FIG. 2A is a block diagram of the service instance
`encryption techniques disclosed herein;
`FIG. 2B is a block diagram of the service instance
`decryption techniques disclosed herein;
`FIG. 3 is a more detailed block diagram of the service
`instance encryption and decryption techniques disclosed
`herein;
`FIG. 4 is a block diagram of the techniques used to
`dynamically provide entitlement agents to a DHCT;
`FIG. 5 is a block diagram of a digital broadband delivery
`system in which the conditional access system is imple-
`mented;
`FIG. 6 is a block diagram of the conditional access system
`in the digital broadband delivery system of FIG. 5;
`FIG. 7 is a diagram of an MPEG-2 transport stream;
`FIG. 8 is a diagram of how EMMs are mapped into an
`MPEG-2 transport stream;
`FIG. 9 is a diagram of how EMMs are mapped into an IP
`packet;
`FIG. 10 is a diagram of how ECMs are mapped into a
`MPEG-2 transport stream;
`FIG. 11 is a detailed diagram of an EMM.
`FIG. 12 is a detailed diagram of a preferred embodiment
`of DHCTSE 627;
`FIG. 13 is a diagram of the contents of memory in
`DHCTSE 627;
`FIG. 14 is a diagram of how NVSCs are allocated to
`entitlement agents in a preferred embodiment;
`FIG. 15 is a diagram of an EAD NVSC;
`FIG. 16 is a diagram of other kinds of NVSCs;
`FIG. 17 is a diagram of an event NVSC;
`FIG. 18 is a diagram of a global broadcast authenticated
`message (GBAM);
`FIG. 19 is a detail of the contents of one kind of GBAM;
`FIG. 20 is a diagram showing how GBAMs may be used
`generally to provide data to a client application;
`FIG. 21 is a diagram of a forwarded purchase message;
`FIG. 22 is a diagram of the entitlement unit message in an
`ECM;
`FIG. 23 is a diagram of a code message;
`FIG. 24 is a diagram showing the relationship between
`TEDs and the rest of conditional access system 601;
`FIG. 25 is a detailed diagram of a TED;
`FIG. 26 is an illustration of the coordinate system used for
`spotlight and blackout;
`FIG. 27 shows how an area is computed in the coordinate
`system of FIG. 26;
`FIG. 28 is a description of a public key hierarchy; and
`FIG. 29 is a description of an EMM generator according
`to the present invention.
`The reference numbers in the drawings have at least three
`digits. The two rightmost digits are reference numbers
`within a figure; the digits to the left of those digits are the
`number of the figure in which the item identified by the
`reference number first appears. For example, an item with
`reference number 203 first appears in FIG. 2.
`
`The following Detailed Description will first provide a
`general introduction to a conditional access system and to
`encryption and decryption, will then describe how service
`instance encoding and decoding is done in a preferred
`embodiment, and will thereupon describe the techniques
`used in the preferred embodiment to authenticate the ECMs
`and EMMs of the preferred embodiment. Next, the Detailed
`Description will describe how EMMs can be used to
`dynamically add and remove access to services and the role
`of encryption and authentication in these operations. Finally,
`there will be a detailed exposition of how the techniques
`described in the foregoing are employed in a broadcast data
`delivery system with a node structure and a reverse path
`from the set
`top box to the head end, of how secure
`processors and memory are employed in the preferred
`embodiment to protect keys and entitlement information,
`and of how certain operations are performed in the preferred
`embodiment.
`Conditional Access System Overview
`FIG. 1 provides an overview of a system 101 for limiting
`access to broadcast
`information. Such systems will be
`termed in the as “conditional access systems”. A service
`distribution organization 103, for example a CATV company
`or a satellite television company, provides its subscribers
`with information from a number of services, that is, c