throbber
4,736,422
`[11] Patent Number:
`[19]
`United States Patent
`
`Mason
`[45] Date of Patent:
`Apr. 5, 1988
`
`[54] ENCRYPTED BROADCAST TELEVISION
`SYSTEM
`
`[75]
`
`Inventor: Arthur G. Mason, Hampshire, United
`Kingdom
`
`[73] Assignee:
`
`Independent Broadcasting Authority,
`London, England
`
`[21] Appl. No.:
`
`705,422
`
`[22] PCT Filed:
`
`Jul. 2, 1984
`
`[86] PCT No.:
`
`PCI‘/GB84/00237
`
`§ 371 Date:
`
`Feb. 22, 1985
`
`§ 102(e) Date:
`
`Feb. 22, 1985
`
`[87] PCT Pub. No.: W085/00491
`
`PCT Pub. Date: Jan. 31, 1985
`
`Foreign Application Priority Data
`[30]
`Jun. 30, 1983 [GB] United Kingdom ............... .. 8317796
`Jul. 22, 1983 [GB] United Kingdom ............... .. 3319317
`
`Int. Cl.‘ ...................... .. H04N 7/167; H04L 9/02
`[51]
`[52] U.S. Cl. ...................................... .. 380/20; 380/21;
`380/10
`[58] Field of Search ....................... 358/114, 122, 123;
`178/22.13, 22.08
`
`[56]
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`4,292,650 9/1981 Hendrickson .
`4,352,011
`9/1982 Guillou .
`4,388,643
`6/1983 Aminetzah ..................... .. 178/22.13
`4,484,027 11/1984 Lee et al.
`............... ..
`4,531,020 7/1985 Wechselberger et al.
`..... .. 358/123
`7/1985 Bluestein et al.
`.............. .. 178/22.08
`4,531,021
`
`4,536,791
`8/1985 Campbell et al.
`....
`..... 380/10
`................. .. 380/20
`4,613,901
`9/1986 Gilhousen et al.
`
`OTHER PUBLICATIONS
`W0, Al, 83/01881 (Communications Satellite Corpora-
`tion), 26 May 1983; see p. 4, Line 1-p. 8, Line 7; p. 9,
`Lines 25-29.
`'
`
`EP, Al, 0014654 (Telediffusion de France), 20 Aug.
`1980, see p. 7, Line 1l—p. 8, Line 26.
`W0, Al, 83/04154 (Telease), 24 Nov. 1983, see p. 4,
`Line 5—p. 7, Line 25.
`
`Primary Examiner—Stephen C. Buczinski
`Assistant Examiner--Melissa L. Koltak
`
`[57]
`
`ABSTRACT
`
`A conditional access system for transmitting and receiv-
`ing scrambled television signals over-air includes means
`for addressing each of the receiving apparatus with an
`over-air signal whereby to permit reception and de-
`scrambling of the signal. The transmitter is provided
`with means for assembling a cipher block of information
`including a first key for use in descrambling the televi-
`sion signal and information relating to a plurality of
`users, and means for encyphering the cipher block with
`a second key which is common to the plurality of users.
`On reception a receiver applies the second, common
`keys to the received cipher block, recovers the first key
`for use in descrambling the signal and the information
`relating to the respective user and descrambles the tele-
`vision signal. Further, it is proposed to transmit a fur-
`ther key in encrypted form and to use the first key to
`decrypt the further key which is then used to descram-
`ble the television signal. This provides a three level key
`system which is very secure but by using a common
`second key for a plurality of users, the time to access
`each user is short.
`
`23 Claims, 5 Drawing Sheets
`
`TRANSMITTER
`sm) é
`
`P
`
`TELEWON
`70 WW A
`
`77
`
`5535/0/v KEYs
`CHANGED
`EVERY FEW
`-_co/v
`
`TER/NG LEVEL or
`SIGNAL rs
`
`KEY s
`
`Ts
`
`5 E P!Ts+$+P)
`
`KEY P
`
`PER/00 KEY P"
`CHANGED
`EACH PER/0D
`
`74
`
`T/ERM3 LEVEL 0/:
`
`CLLSTOMER Tc
`
`SI-MRED
`
`17
`
`Tc
`
`1
`
`D/S77?/BUT/UN
`KEY 0
`
`Kg’
`
`E=ENCRYPT/ON
`E'7=-DECRYPT/0N
`
`DWP’ %
`76
`
`RECEIVER
`
`23
`
`TELEV/S/0N
`
`
`
`PMC Exhibit 213
`
`Apple v. PM
`|PR2016-0075
`
`Page 1
`
`PMC Exhibit 2133
`Apple v. PMC
`IPR2016-00753
`Page 1
`
`

`
`U.S. Patent
`
`Apr. 5, 1988
`
`Sheet 1 of 5
`
`4,736,422
`
`zqasmHut
`
`§,§m
`
`cm
`
`Emomm
`
`qmzfima_.
`
`
`
`amt\§.m\_.w
`
`828%
`
`qmmzfiomExQSQMQ.w#23
`
`QQEMQ.:6Km
`
`UsEmaSam:
`
`
`
`usmsfluznmt
`
`QREEEQQ
`
`qmmqmm
`
`\<QRbm\&.PQQ
`
`Q
`
`.-w>sE\_m:.n:9&m.t§\m2§t2.
`
`mézum
`
`qmmzfiuWExzommmm
`
`
`
`
`
`ZQREQQZMHW
`
`IIIIII
`
`IaJumuasumqEmamm_em9QEx
`
`
`
`>\©Rn\\§6mQ11-m
`
`PMC Exhibit 213
`
`Apple v. PM
`|PR2016-0075
`
`Page
`
`PMC Exhibit 2133
`Apple v. PMC
`IPR2016-00753
`Page 2
`
`
`
`
`

`
`PSU
`
`2Mab
`
`/U3794
`
`22A,
`
`
`
`52gE...Em8mommmmmwmmmzqmmmmnézm
`
`
`
`
`
`.mm%E5
`
`QE:
`
`:E&8%mmmmcEsmmaxi
`
`.
`
`Am.
`
` %%I105,%Q8W.WW.W.Wm.mEx%§mNW.
`
`
`2o\.SmEEq
`
`gmrmsmemtmAqsmmmES5www5wm_.!||aE%Smmuqmmmsin;
`
`,NGQ
`
`PMC Exhibit 213
`
`Apple v PM
`|PR2016-0075
`
`Page
`
`PMC Exhibit 2133
`Apple v. PMC
`IPR2016-00753
`Page 3
`
`

`
`U.S. Patent
`
`Apr. 5, 1988
`
`Sheet 3 of 5
`
`4,736,422
`
`787 Bl T PLA/NTEXT BLOCK
`
`I 64 B/TE
`
`
`
`
`M/N/MUM OI/ERLAP
`OF E BLOCKS
`76 B/73
`
`
`
`75t$TAGE
`
`
`M/N/MUM OVERLAP
`OF E BLOCKS
`75 8/75
`
`
`
`
`
`
`87 Bl T INTERMEDIATE STAGE
`
`
`
`
`64 B/TE1|
`
`64 B/TE
`
`
`n 7
`
`
`
`
`64 B/T E
`
`
`2'75/STAGEI
`
`
`187 B/T C/PHERTEXT BLOCK
`
`E=64 B/T BLOCK ENCRYPT/ON ALGORITHM
`
`/‘7G.3c7.
`
`PMC Exhibit 213
`
`Apple v. PM
`|PR2016-0075
`
`Page
`
`PMC Exhibit 2133
`Apple v. PMC
`IPR2016-00753
`Page 4
`
`

`
`%SU
`
`r._M
`
`.115,
`
`hS
`
`2M6
`
`m829828%\:\\Smzo
`
`mmtmwemxmm:amflmammPE:
`
`
`
`zotginmdzorammé5.EM.mmqmhe
`4>§.§%2m.mmtwamm.m.Hmmflmm:
`
`
`
`4.,..miqmsmmts
`
`Bmm:mmfimQmd
`QM;umxmmmtmsmm
`
`938..§\m
`
`PMC Exhibit 213
`
`Apple v. PM
`|PR2016-0075
`
`Page
`
`PMC Exhibit 2133
`Apple v. PMC
`IPR2016-00753
`Page 5
`
`
`

`
`U.S. Patent
`
`Apr. 5,1988
`
`
`
`Sheet 5 of5
`
`4,736,422
`
`‘“"TD0/dm/*2)
`
`CUS7DMERS x,y,z
`SHARE KEY odd
`
`{Y2}
`0
`new '
`
`X BECOMES A P/RATE
`AND /S EL/M/NATED
`
`Uz
`
`Uy
`
`THE BROADCASTER /5
`SURE THAT YAND 2
`HAVE RECE/VED anew
`BECAUSE THEY HAVE
`BOTH SENT TWO
`SUBSCR/PT/ONS
`
`Dneww’
`
`_
`
`Ho .4.
`
`PMC Exhibit 213
`
`Apple v. PM
`|PR2016-0075
`
`Page
`
`PMC Exhibit 2133
`Apple v. PMC
`IPR2016-00753
`Page 6
`
`

`
`ENCRYPFED BROADCAST TELEVISION SYSTEM
`
`1
`
`4,736,422
`
`2
`of an embodiment thereof given by way of example, in
`which:
`'
`
`5
`
`10
`
`15
`
`FIG. 1 shows a block diagram of an encryption sys-
`tem;
`The present invention relates to the broadcasting of a
`FIG. 2 shows the structure of one part of one of the
`television signal in scrambled form and more particu-
`larly to a system for enabling the scrambled television
`signals sent in the system shown in FIG. 1;
`signal to be descrambled by authorised viewers only.
`FIGS. 3a and 3b show diagrammatically two ways of
`It has already been proposed to broadcast scrambled
`implementing a part of FIG. 2; and
`television signals. It has also been proposed to transmit
`FIG. 4 shows a method of replacing shared distribu-
`with the scrambled television signal the key for de-
`tion keys.
`scrambling the signal but the key is encrypted by a
`A preferred embodiment of the present invention will
`further key, an identification key, which is unique to
`be described in relation to an over-air addressing DBS
`television encryption system as shown in FIG. 1. A
`each viewer. In order to decrypt the key the viewer
`subscriber cannot make use of a conditional access tele-
`must use his identification key signal and await the
`broadcast encrypted key.
`vision programme without being in possession of the
`This is acceptable as long as the number of viewers is
`key that was used for the signal encryption. Further-
`not considerable but where one is broadcasting to a
`more, this key must be kept secret from the customer.
`considerable number of viewers, for example with satel-
`Since the broadcast signal, in this case the satellite sig-
`lite broadcasting, it can take a considerable time to
`nal, is common to all subscribers, it follows that the key
`access all the viewers with their own encrypted key 20 which is used to cipher the television signal must also be
`signal to enable them to descramble the broadcast tele-
`common to everyone. It is generally regarded as inse-
`vision signal. While this problem can be overcome by
`cure to have the same key held in millions of receivers
`leaving the receiving apparatus powered up continu-
`for long periods of time. This is because the key might
`ously, this is not a convenient or inexpensive solution to
`be discovered by one subscriber who could then distrib-
`the problem. Furthermore, when the receiver is first 25 ute it to others customers, who would use it to obtain
`purchased a long waiting time results.
`free television programmes. The only way to avoid this
`problem is to change this key, which we call the session
`It is an object of the present invention to provide a
`system for sending encrypted programme entitlements
`key (S), at very frequent intervals. The session key (S) is
`also known in other references as the central word
`together with a period key to one of a large number of
`viewers in such a way that he can relatively quickly 30 (CW) or the initialisation word (I) or indeed the service
`access the encrypted entitlements and period key which
`key (S). The session key interval may be of the order of
`enablehimto decypher the scrambled teleivision signal.
`one to ten seconds to avoid long access times when
`The period key (P) is also known as the authorisation
`different channels are selected. Clearly the only way to
`key (A), but it will be called the period key here.
`send a new session key, that changes every few seconds,
`The present invention provides for sending to a plu- 35 is with the broadcast signal. The session key is not sent
`rality of viewers their individual programme entitle-
`with the television signal in the clear—-it is encrypted
`ment and the period key, encrypted together as one
`with another key that is stored in the receiver. Ulti-
`cipher text block by means of a single distribution key
`mately, there will have to be a key stored in each re-
`which is used by each viewer to obtain the necessary
`ceiver that has to be kept secret from the user. One way
`information for descrambling the television signal. 40 to achieve this secrecy is to ‘bury’ the key in an inte-
`Hence the distribution key and the cipher text block is
`grated circuit or some device which cannot easily be
`shared between the plurality of viewers. The sharing of
`broken open. Since it is not possible to send new secu-
`information in this way enables a reduction in the total
`rity devices to each customer at regular very short
`means of bits that have to be transmitted without com-
`intervals—it follows that the key stored in each device
`promising the security. The reduction of bits occurs
`must be unique to each subscriber for reasons of system
`because in a shared block, only one period key needs to
`security. The customer unique key that is stored in the
`be sent and its overhead is shared. If the cipher text
`security device will be called the distribution key (D).
`block was not shared a separate period key, which
`Since there are a huge number of distribution keys,
`needs to be a large number of bits, would have to be
`using this key to distribute the session key to each cus-
`appended to each viewers entitlements for reasons of
`tomer is impractical. This is because the time taken to
`security.
`send the session key would be much longer than the one
`The present invention also provides a secure scram-
`second duration for which the session key is valid. In
`bling system for apparatus for transmitting a scrambled
`order to overcome this problem a period key (P) is
`information signal comprising means for generating a
`introduced. The key is available for some period "which
`first encryption signal (S), first encryption means for
`is defined by the broadcaster—-the period may be as
`little as one hour or as much as one month. the duration
`encrypting the information signal in accordance with
`of the period is a compromise between security and the
`the encrypting key signal (S), means for generating a
`second encryption key signal (P), second encryption
`operational difficulties in receiving the key. The period
`means for encrypting the first encryption key signal in
`key is common to all subscribers and is used to carry the
`accordance with the second encryption key signal (P),
`session key. The period key is itself carried by the cus-
`tomer distribution keys which are stored in each re-
`means for generating a third encryption key (D), third
`ceiver.
`encryption means for encrypting the second encryption
`key signal (P) in accordance with the third encryption
`FIG. 1 shows schematically how a practical system
`key signal (D), and means for transmitting the scram-
`might be implemented. An information signal A, in this
`case a television signal, is to be scrambled for transmis-
`bled information signal and at least the encrypted sec-
`ond encryption scrambling key signal.
`sion. Firstly a session key S is generated by suitable
`Features and advantages of the present invention will
`circuitry 10 and this key S is used to scramble the signal
`become more apparent from the following description
`A in accordance with the key S as represented by the
`
`45
`
`50
`
`55'
`
`65
`
`PMC Exhibit 213
`
`Apple v. PM
`|PR2016-0075
`
`Page
`
`PMC Exhibit 2133
`Apple v. PMC
`IPR2016-00753
`Page 7
`
`

`
`4,736,422
`
`10
`
`15
`
`30
`
`35
`
`3
`4
`10-5. In fact some 1000 customers could share the same
`block 11. So that the key S can be securely sent to a
`receiver, it is also scrambled in a circuit 12 in accor-
`key with negligible effect upon the system security.
`dance with a further scrambling routing identified by a
`We propose to send the period key and the entitle-
`second key P generated by suitable circuitry 14. Both
`ment signals indicative of each of a plurality of subscrib-
`ers in one block as shown in FIG. 2. In the numerical
`the session key S and the second key P are changed at
`intervals but the second key need be changed at less
`example shown below a block size of 510 bits is used.
`frequent intervals than the session key S.
`A BCH error correcting code is defined by the block
`Finally, the second key P is scrambled in a circuit 16
`to allow correct reception at a specified bit error rate.
`by a third key, the distribution key D, generated by a
`The BCH code requires several bits within the block to
`circuit 17. The scrambled information signal, the scram-
`be used for error correction leaving the remainder for
`bled session key and the scrambled second key are then
`use as a message which contains the following informa-
`tion:
`transmitted using any suitable equipment.
`In a receiver, the reverse operation is carried out. It is
`(i) A period key of about 56 bits. The period key bits
`first necessary for a customer to decrypt the second key
`could be evenly distributed throughout the message
`P using his distribution key D before the session key S
`block. However, this is not really necessary because
`can be recovered for decrypting the information signal.
`of the nature of the block encryption algorithm
`which is used.
`Thus a first decryption circuit 20 responsive to distribu-
`(ii) A byte of about 8 bits for each customer in the block.
`tion key D is provided for decrypting the second key P
`and a second decryption circuit 21 responsive to the
`A number of customers have bytes in the one block.
`The following represents an example of the proposal.
`second key P is provided for decrypting the session key 20
`(i) no. of bits per block: N=510
`S which is then used in a third decryption circuit 23 for
`(ii) no. of bits for error correction: E= 136
`decrypting the information signal A.
`(iii) no. of bits for the message: M=374
`Different customers may require different entitle-
`(iv) no. of bits for period key: P= 56
`ments to the service. Furthermore, the entitlement may
`take different forms, e.g. a simple indication of whether 25 With this arrangement if each customer used 8 bits
`a basic subscription has been paid or note, or they may
`then 46 customers could each share the block. In prac-
`indicate an over-air credit payment or they may simply
`tice a mode word of 6 bits and a date stamp of 24 bits is
`indicate a tier level to which the viewer subscribes. The
`also included which is shared by the plurality of cus-
`tomers. This allows 36 customers to share the block
`entitlements are represented by a small number of bits
`which gives a cycle time of 10 minutes for 15 million
`which are preferably sent together with the period key
`subscribers when a data rate of about 350K Bits/sec is
`(P) in a shared cipher text block. The example described
`below makes use of the entitlement bits for tiering.
`used. However, the technique may be generalised to
`However, the mode of use of the entitlement bits does
`any number of bits.
`not affect the principle of showing a distribution key
`The block is encrypted using an algorithm which has
`and an encrypted cipher text block together between a
`the properties of error extensions. Such an algorithm
`plurality of viewers.
`can be constructed from a block or feedback cipher
`The tiering level of the signal (Ts) is sent with the
`arrangement which has the property that if one bit of
`the cipher text is falsified the resulting plain text mes-
`session key. The tiering level requested by the customer
`sage will loock look completely random even when the
`(Tc) is sent to him with the period key using his distri-
`correct distribution key is used to decrypt the block.
`bution key. The security device compares Ts and To
`and decides whether the session key can be released for
`This also means that there does not exist a unique set
`of 56 bits in the ciphered message to which the distribu-
`the purpose of deciphering the television signal (A).
`The session key (S) is used to encipher the television
`tion key could be applied in order to recover the period
`signal. It is sent together with the tiering level of the
`key. In order to find the period key, without knowledge
`programme (Ts) by encrypting these signals with the
`of the distribution key, either an exhaustive search of
`the 374 bits is needed or the encryption algorithm needs
`period key P(T;+S+P). The reason for duplicating the
`period key (P) in the message, before encryption with
`to be broken. After deciphering the message, each secu-
`the same key P, will be described later. More than one
`rity device looks in the correct place within the block
`for the customer entitlement bits that are intended for
`session key may be sent if more than one operator is
`that receiver. Clearly this function must be buried in the
`broadcasting simultaneously on the same satellite signal.
`security device along with the distribution key.
`This may happen for instance if one operator provides
`the television programme and another organisation
`The block or feedback cipher should have the follow-
`provides a data service. (The symbol ‘+’ means that the
`ing property. If one bit of the cipher text is altered, a
`bits of the signals are appended together.)
`number of bits of the plain text will be altered, under the
`The main problem with this system is the time taken
`same key, and these altered bits will be evenly distrib-
`to send the signal D(Tc+P) to each customer. If a
`uted over the plain text message.
`unique key D is defined for each subscriber the cycle
`FIG. 3a shows schematically how long blocks may
`be ciphered using a number of 64 bit sub-blocks. Each
`time of this validation signal, after error correction has
`been applied, can take many hours.
`sub-block is a 64 bit block cipher.
`We propose reducing the validation cycle time by
`The essential features is to overlap the sub-blocks and
`sharing the same distribution key D between a number
`form an intermediate stage. The final cipher text block
`of customers. This still offers excellent system security
`is guaranteed to have the properties described above by
`reversing the direction in which the sub-blocks are over-
`since, if the number of customers sharing the same key
`is small, the probability of finding another customer
`lapped during the second stage. The same technique of
`with the same key as ones own is tiny. For example, if
`forming an intermediate stage and reversing the direc-
`20 customers share each key and there are 20 million
`tion in which the algorithm is performed for the second
`subscribers in the system,
`the probability of finding
`stage can be applied to cipher feed back in order to
`another customer with the same key as ones own is
`achieve the necessary cipher text properties. Cipher
`
`45
`
`50
`
`55
`
`65
`
`PMC Exhibit 213
`
`Apple v. PM
`|PR2016-0075
`
`Page
`
`PMC Exhibit 2133
`Apple v. PMC
`IPR2016-00753
`Page 8
`
`

`
`4,736,422
`
`5
`feedback is a well known technique and the technique
`of reciphering the cipher text in the reverse direction is
`shown in FIG. 3b.
`The proposed system of sharing a distribution key
`between several subscribers suffers from the problem
`that if one customer becomes a pirate, removal of the
`key affects the other customers who also share that key.
`There are basically two methods of overcoming this
`problem which are described below.
`Instead of storing just one secret distribution key,
`each customer has a plurality of keys e.g. two, stored in
`his receiver. The first key would be common to a first
`set of customers while the second key would be com-
`mon to a second set of customers. One one member of
`the first set can be in the second set. Each customer is
`then given a unique combination of two keys from the
`total number of keys available. The total number of
`combinations far exceeds the total number of keys avail-
`able.
`
`A pirate is eliminated by removing both of his keys
`from the cycle. Since the customers who share his two
`keys all have another but different key remaining, they
`are able to continue. This results from the fact that the
`pirate is the only customer who is a member of both
`shared key sets.
`It can be shown mathematically, that because the
`number of combinations is huge, the probability of dis-
`abling honest customers after many pirate combinations
`have been removed is small.
`Instead of storing two distribution keys which are
`both shared, two keys may be stored via the receiver
`and used in the following way.
`The first key is the shared distribution key and the
`second is a unique key which is not shared and it is
`different for each customer. When a pirate is detected a
`new shared distribution key (DNEW) is sent to each of
`the remaining honest customers by encrypting it with
`their personal Unique key (U); see FIG. 3. Hence if X,
`Y and Z share a block which is normally encrypted
`with the shared Distribution key (Doug) and X be-
`comes a pirate; customers Y and Z are send DNEW by
`transmitting Uy (DNEW) and U2 (DNEW). Clearly the
`format for the transmission of U(D) is much less effi-
`cient than the shared distribution key cycle D(M+P)
`but this is not important because the second cycle only
`includes a very small number of customers. A broad-
`caster can be sure that his customer has received this
`new shared distribution key (D) by transmitting the
`U(D) signal until his customer has returned say two
`subscription payments. Since the cycle time of the U(D)
`signals will be very small, probably less than one min-
`ute, and because the customer has returned more than
`one subscription payment—the broadcaster can be con-
`fident that his customer will have received the new
`shared key. This confidence relies upon the assumption
`that each subscriber will be watching television for
`more than one minute during a subscription period for
`which he has paid.
`The idea of transmitting a small U(D) cycle for a long
`period of time allows the cycle time/data capacity to
`expand to cater for an emergency update and then con-
`tract again afterwards. Hence the average cycle time/-
`data capacity stays approximately constant during the
`lifetime of the system; it is illustrated in FIG. 3. In order
`to maximise the efficiency of the system the same tech-
`nique can be applied to reconfigure into new shared
`blocks those customers who have become the only
`members of an old shared block. This is achieved by
`
`6
`sending new addresses to old customers using the same
`method described above.
`is contained within the en-
`The information that
`crypted block not only contains the new shared distri-
`bution key D and the new address (a), but also the U
`key. The encrypted block then takes the form U(D-
`+a+U). The U key is sent in the encrypted block for
`the purpose of checking that the information has been
`received correctly. Provided that the secret U key is
`also found in the message after decryption, the remain-
`der of the information is accepted.
`The above described system makes use of storing of
`the secret distribution keys in a user held security de-
`vice. Since the copying of the contents of the security
`device is likely to represent a weak link in the system,
`re-issue of the security device from time to time might
`be required by‘ the broadcaster. Therefore, an altema-
`tive approach is to mount the security device in such a
`way that is can be re-issued periodically at little ex-
`pense. Such a device could be a security microproces-
`sor mount in a SMART card.
`If it is required to remove a key before the re-issue
`date, the broadcaster simply contacts the other custom-
`ers who share that key and sends them a new SMART
`card. Since the number of customers who share the
`removed key is very small (approx. 36) this practice
`unlikely to cause much of a problem. Furthermore, the
`broadcaster might offer one month’s free viewing to
`compensate for the inconvenience caused to the honest
`key holders.
`Modifications to the above described system may be
`made which will improve the practicality of the system.
`For example, the period key that is sent in the validation
`cycle may be the key for the next period. Although this
`key may be received quickly it should not be able to be
`used straight away. This would mean that a new cus-
`tomer may have to wait for several weeks before he
`could receive television programmes. In order to over-
`come this problem the current period key is sent en-
`crypted with the next period key-—-PN15XT(PcURRE_;vT).
`Provided the customer is permitted to receive pro-
`gramme during the next month, say, he may begin view-
`ing from the time he has received his validation signal.
`A further modification is to send a known code en-
`crypted with the period key. This signal is useful for the
`purpose of deciding whether the period key has been
`received correctly and that the encrypted block has not
`been falsified. The code could be made secret by using
`the period key for the special code. The receiver finds a
`binary word that it thinks is the period key by decrypt-
`ing the signal D(T¢+ P). Provided the period key P has
`been received without error, using it to decrypt the
`signal P(P) or P(Ts+S+P) will reveal the same period
`key P. this can be checked by comparing the received P
`key value with the value of the P key contained in the
`message Ts+S+P. If the comparison is negative the
`receiver makes the decision to interrogate the address
`cycle again. The check also ensures that the signal
`P(Ts+S+P) as well as the signal P(T¢+P) is a valid
`signal.
`The encryption system signals may be formatted into
`a data frame in a packet system such as is proposed for
`the sound for the European Satellite Broadcast signal
`standard. A sync word and address word are needed to
`locate the various signals. the security device uses the
`address word to find the particular 510 bit block, in the
`long validation cycle, that is intended for that receiver.
`
`S
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`45
`
`50
`
`55
`
`65
`
`PMC Exhibit 213
`
`Apple v. PM
`|PR2016-0075
`
`Page
`
`PMC Exhibit 2133
`Apple v. PMC
`IPR2016-00753
`Page 9
`
`

`
`4,736,422
`
`7
`A method of synchronising the key changes may be
`achieved in a packet multiplexing system by having two
`signals. The first is a frame counter on line 625 which
`represents a clock. Keys arrive asynchronously and are
`changed during line 625 at specified times. A second
`signal is sent in the packet multiplex which labels the
`transmitted keys with the time that they are to be acti-
`vated. An alternative approach, which eliminates the
`need for a time label, is to transmit the keys synchro-
`nously with the television signal. There are two keys
`that need to be changed—the period key and the session
`key.
`What is claimed is:
`1. Apparatus for transmitting a scrambled informa-
`tion signal, togther with a key required at a receiver to
`enable descrambling of the scrambled information sig-
`nal to occur, to entitled receivers, comprising:
`means for scrambling an input information signal A to
`produce a scrambled information signal S(A);
`means for generating a first encryption key P re-
`quired at a receiver to enable descrambling of the
`scrambled information signal S(A) to occur;
`means for defining groups of entitled receivers;
`means for generating a plurality of distribution keys
`D, each distribution key being generated for a par-
`ticular group of entitled receivers;
`means for generating a plurality of receiver entitle-
`ment signals Tc, each receiver entitlement signal
`being representative of the level of entitlement of a
`respective receiver to descramble scrambled infor-
`mation signals;
`means for assembling data blocks, adapted to assem-
`ble for each group of entitled receivers a data block
`comprising the first encryption key P appended to
`the receiver entitlement signals Tc for the receivers
`in the respective group, the receiver entitlement
`signal Tc for a particular receiver in a group being
`included in the respective data block at a predeter-
`mined location therein;
`first encryption means for encrypting each data block
`using one of the distribution keys, the first encryp-
`tion means being adapted to encrypt a data block
`relating to a given group of entitled receivers using
`a particular distribution key to enable the receivers
`in a group to use the same particular distribution
`key to recover the first encryption key P; and
`means for transmitting the scrambled information
`signal S(A) and the encrypted data blocks.
`2. Apparatus according to claim 1, wherein the data
`block assembling means is adapted to assemble a data
`block omitting a receiver entitlement signal in respect of
`a first receiver belonging to the group to which the data
`block relates when said receiver is no longer entitled to
`recover the information signal A; and
`the first encryption means is adapted to encrypt data
`blocks relating to said group but omitting a re-
`ceiver entitlement signal
`in respect of said first
`receiver using a distribution key DNEW different
`from that used to encrypt data blocks relating to
`said group but including a receiver entitlement
`signal in respect of said first receiver.
`3. Apparatus according to claim 2, and comprising
`means for producing a unique key U for each receiver,
`second encryption means for encrypting distribution
`keys D, one at a time, using said unique keys U, one at
`a time, and means for transmitting the encrypted distri-
`bution keys U(D); wherein the second encryption
`means is arranged to encrypt a distribution key DNE»/a
`
`l0
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`65
`
`8
`plurality of times using each of a plurality of unique
`keys U in turn, the plurality of unique keys U relating to
`entitled receivers in a group omitting a first receiver no
`longer entitled to recover the information signal A,
`when the distribution key DNEW is used by the first
`encryption means to encrypt a data block relating to
`said group but omitting a receiver entitlement signal in
`respect of said first receiver.
`4. Apparatus according to claim 1, wherein the algo-
`rithm used in the encryption means has the property
`that if any part of the encrypted signal is altered an
`approximately random decrypted signal results when
`the encrypted signal is decrypted with the correct dis-
`tribution key to make any of the received signals use-
`less.
`5. Apparatus according to claim 1, further comprising
`means for generating a second encryption key S, third
`encryption means for encrypting the second encryption
`key S using the first encryption key P, and means for
`transmitting the encrypted second encryption key P(S),
`and wherein the means for scrambling the input infor-
`mation signal uses the second encryption key S to con-
`trol the scrambling of the information signal.
`6. Apparatus according to claim 5, wherein the means
`for generating a second encryption key S is arranged to
`alter the second encryption key S at a first frequency
`and the means for generating a first encryption key P is
`arranged to alter the first encryption key at a second
`frequency lower than the first frequency.
`7. Apparatus according to claim 5, further comprising
`means for generating signals T5 indicative of a parame-
`ter of the input information signal, said third encryption
`means encrypts said signals Ts, either alone or ap-
`pended to the second encryption key S, using the first
`encryption key P, and the means for transmitting the
`encrypted second encryption key S transmits the en-
`crypted Ts signals.
`8. Apparatus according to claim 6, further comprising
`means for generating signals T5 indicative of a parame-
`ter of the input information signal, said third encryption
`means encrypts said signals T5, either alone or ap-
`pended to the second encryption key S, using the first
`encryption key P, and the means for transmitting the
`encrypted second encryption key S transmits the en-
`crypted Ts signals.
`9. Apparatus according to claim 7, further comprising
`means for generating a CODE signal, and wherein said
`third encryption means encrypts said CODE signal,
`either alone or appended to a signal orvencryption key
`generated in the transmitter, using the first encryption
`key P, and the means for transmitting the se

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket