throbber
(19)
`
`(12)
`
`Europäisches Patentamt
`
`European Patent Office
`
`Office européen des brevets
`
`*EP001418756A2*
`EP 1 418 756 A2
`
`(11)
`
`EUROPEAN PATENT APPLICATION
`
`(43) Date of publication:
`12.05.2004 Bulletin 2004/20
`
`(21) Application number: 03104017.3
`
`(22) Date of filing: 29.10.2003
`
`(84) Designated Contracting States:
`AT BE BG CH CY CZ DE DK EE ES FI FR GB GR
`HU IE IT LI LU MC NL PT RO SE SI SK TR
`Designated Extension States:
`AL LT LV MK
`
`(30) Priority: 29.10.2002 US 284049
`
`(71) Applicant: General Instruments, Motorola Inc
`Horsham PA 19044 (US)
`
`(72) Inventors:
`• Chen, Annie On-yee
`92014, Del Mar (US)
`• Tang, Lawrence W
`92128, San Diego (US)
`
`(51) Int Cl.7: H04N 7/167, H04N 7/16
`
`• Murphy, Patrick
`92123, San Diego (US)
`• Okimoto, John I
`92128, San Diego (US)
`• Cochran, Keith R.
`San Diego 92108 (US)
`• Hutchings, George T
`18901, Doylestown (US)
`
`(74) Representative: McCormack, Derek James et al
`Motorola
`European Intellectual Property Operations
`Midpoint
`Alencon Link
`Basingstoke Hampshire RG21 7PL (GB)
`
`(54) Method and system for encrypting material for distribution
`
`(57)
`Streaming content is encrypted by segmenting
`the content into a plurality of crypto periods, and by en-
`crypting the content for each of a plurality of crypto pe-
`riods with a different cryptographic key. The crypto pe-
`riods may be based on either (i) fixed time intervals, (ii)
`
`a fixed number of packets, (iii) a fixed marker count, or
`(iv) a pseudo random number of packets. Methods are
`provided for determining how to record the key changing
`criteria, and how to convey this information to video on
`demand (VOD) servers.
`
`Printed by Jouve, 75001 PARIS (FR)
`
`EP1 418 756A2
`
`1
`
`APPLE 1006
`
`

`

`1
`
`EP 1 418 756 A2
`
`2
`
`Description
`
`TECHNICAL FIELD OF THE INVENTION
`
`[0001] The invention relates to a method and a sys-
`tem for encrypting material such as video material for
`distribution. In particular, it relates conditional access
`and copy protection techniques, and more particularly
`to such techniques for interactive, on-demand digital
`program content such as video-on-demand (VOD) pro-
`gramming distributed via cable and satellite networks.
`
`BACKGROUND
`
`[0002] Recent advances in cable and satellite distri-
`bution of subscription and "on-demand" audio, video
`and other content to subscribers have given rise to a
`growing number of digital set-top boxes (sometimes re-
`ferred to as Digital Consumer Terminals or "DCTs") for
`decoding and delivering digitally broadcast program-
`ming. These set-top boxes often include additional cir-
`cuitry to make them compatible with older analog en-
`coding schemes for audio/video distribution. As the mar-
`ket for digital multimedia content of this type grows and
`matures, there is a corresponding growth of demand for
`new, more advanced features.
`[0003] Video-on-demand (hereinafter VOD) and au-
`dio-on-demand are examples of features made practical
`by broadband digital broadcasting via cable and satel-
`lite. Unlike earlier services where subscribers were
`granted access to scheduled encrypted broadcasts (e.
`g., movie channels, special events programming, pay
`per view purchases, etc.), these on-demand services
`permit a subscriber to request a desired video, audio or
`other program at any time and to begin viewing the con-
`tent at any point therein. Upon receiving the request for
`programming (and, presumably, authorization to bill the
`subscriber's account), the service provider then trans-
`mits the requested program to the subscriber's set-top
`box for viewing/listening. The program material is typi-
`cally "streamed" to the subscriber in MPEG format for
`immediate viewing/listening, but can also be stored or
`buffered in the set-top box (typically on a hard-disk drive
`or "HDD") for subsequent viewing/listening.
`[0004] The Motion Picture Association of America
`(hereinafter MPAA) is a trade association of the Ameri-
`can film industry, whose members include the industry's
`largest content providers (i.e., movie producers, studi-
`os). The MPAA requires protection of VOD content from
`piracy. Without adequate security to protect their con-
`tent, its member content providers will not release their
`content (e.g., movies) for VOD distribution. Without up-
`to-date, high-quality content, the VOD market would be-
`come non-viable.
`[0005] Access control methods, which may include
`encryption, are continually evolving to keep pace with
`the challenges of video-on-demand (VOD) and other
`consumer-driven interactive services. With VOD, head-
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`2
`
`end-based sessions are necessarily becoming more
`personalized. In this scenario, video streams are indi-
`vidually encrypted and have their own set of unique
`keys.
`[0006] One key area of concern, especially for direct
`content providers and movie companies, is VOD copy
`protection. The method by which content is produced
`and delivered to consumers is constantly changing. Un-
`der the newest scenarios, content delivery can occur
`over data backbones, satellite networks and the Inter-
`net, increasing the potential for hackers to get digitally
`perfect copies of the VOD content. As the VOD industry
`develops and adapts to the piracy threat by providing
`more sophisticated encryption schemes, piracy be-
`comes more difficult, but the potential gain to the video
`"pirate" for achieving successful encryption breaches
`(successful content copying) remains a considerable at-
`traction to hackers.
`[0007] Assuming that physical security and network
`security measures are adequate at the movie company,
`the VOD encoding company and at the MSO (Multiple
`System Operator) or satellite operator's facilities, the
`primary points of VOD vulnerability to piracy occur when
`VOD content is transmitted over widely accessible com-
`munication networks such as a satellite channel, the In-
`ternet or a cable system. Such transmissions can occur
`between the movie company and the VOD encoder, be-
`tween the VOD encoder and the MSO or satellite oper-
`ator, and between the MSO or satellite operator and the
`VOD customer. Because of the ease with which such
`transmissions can be intercepted, these are the points
`where the risk of piracy is the greatest.
`
`SUMMARY OF THE INVENTION
`
`[0008] According to the invention, techniques are pro-
`vided to pre-encrypt VOD material with a changing cryp-
`tographic key and to convey this information to VOD
`servers so that the VOD servers can send out the cor-
`responding ECMs (Entitlement Control Messages)
`when the encrypted content is delivered to a consumer's
`digital set top.
`[0009] Further according to the invention, multiple en-
`cryption keys are added when pre-encrypting VOD ma-
`terial. More specifically, methods are provided for deter-
`mining when to change encryption keys; how to record
`the key changing criteria, and how to convey this infor-
`mation to the VOD servers.
`[0010] Further according to the invention, streaming
`content is encrypted by segmenting the content into a
`plurality of crypto periods, and encrypting the content
`for each of a plurality of crypto periods with a different
`cryptographic key. The crypto periods may be estab-
`lished as follows:
`
`1) Fixed crypto period: Define a crypto time interval
`and change the key each time the crypto time-inter-
`val passes.
`
`

`

`3
`
`EP 1 418 756 A2
`
`4
`
`2) Fixed number of packets: Determine a number
`of content packets "n" corresponding to a suitable
`time interval and change the cryptographic key eve-
`ry "n" packets.
`3) Fixed "marker" count: Using a suitable MPEG-II
`field type as a "marker", such as an I-frame header,
`change the cryptographic key every time "n" mark-
`ers have passed in the stream, where "n" is selected
`to produce a suitable crypto period. The MPEG-II I-
`frame header is one example of a suitable "marker."
`Alternatively, any other suitable, recurring MPEG-II
`encoding element could be used as a stream "mark-
`er" to delimit segments of the MPEG-II stream.
`4) Random crypto period: Change the crypto-period
`randomly within upper and lower constraints on the
`crypto period, using a pseudo-random algorithm.
`Calculate a number of packets for each crypto pe-
`riod and change the key after that number of pack-
`ets. Generate an index file indicating at which pack-
`et numbers the encryption key should be changed.
`
`ECM
`
`5
`
`10
`
`EMM
`
`15
`
`20
`
`cific encryption key is valid.
`
`Entitlement Control Message. Entitlement
`Control Messages are private conditional
`access information which specify control
`words and possibly other, typically stream-
`specific, scrambling and and/or control pa-
`rameters.
`
`Entitlement Management Message. Condi-
`tional access messages used to convey en-
`titlements or keys or other parameters to
`users, or to invalidate or delete entitlements
`or keys. For example, an EMM can be used
`in combination with an ECM to determine
`an encryption key. Without the EMM, the
`key cannot be derived. The following cate-
`gories of EMM are possible:
`
`EMM-G: EMM for the whole audience
`EMM-S: Shared EMM between the ele-
`ments of a group.
`EMM-U: EMM for a single client.
`
`[0011] The invention is particularly useful for generat-
`ing rapidly changing encryption keys, and for methods
`of communicating how and when to change the keys in
`the context of, for example, the MediaCipher-II condi-
`tional access (CA) system available from the Broadband
`Communications Sector of Motorola, Inc., Horsham,
`Pennsylvania, USA. Motorola's MediaCipher-II system
`is capable of changing keys at rates (crypto periods)
`which are measured in fractions of a second, rather than
`several seconds.
`
`GLOSSARY
`
`[0012] Unless otherwise noted, or as may be evident
`from the context of their usage, any terms, abbrevia-
`tions, acronyms or scientific symbols and notations
`used herein are to be given their ordinary meaning in
`the technical discipline to which the invention most near-
`ly pertains. The following glossary of terms is intended
`to lend clarity and consistency to the various descrip-
`tions contained herein, as well as in prior art documents:
`
`CA
`
`CAS
`
`Conditional Access. A means by which ac-
`cess to content is granted only if certain pre-
`requisite conditions are met (e.g., payment
`of a subscription fee, time-dependent li-
`cense, etc.)
`
`Conditional Access System. A means of al-
`lowing system users to access only those
`services that are authorized to them, com-
`prises a combination of authentication and
`encryption to prevent unauthorized recep-
`tion
`
`CP
`
`Crypto Period. A period covering a portion
`of an encrypted stream during which a spe-
`
`25
`
`ER
`
`Encryption Record. Contains information
`about how specific program content is en-
`crypted, and rules for decoding.
`
`30
`
`35
`
`40
`
`45
`
`ERS
`
`Internet
`
`Encryption Renewal System. A system by
`which a conditional access license is re-
`newed.
`
`The Internet (upper case "I") is the vast col-
`lection of inter-connected networks that all
`use the TCP/IP protocols. The Internet now
`connects many independent networks into
`a vast global internet. Any time two or more
`networks are connected together, this re-
`sults in an internet (lower case "i"; as in in-
`ternational or inter-state).
`
`MPAA
`
`Motion Picture Association of America
`
`MPEG
`
`Moving Pictures Experts Group
`
`MPEG-II MPEG-2 is the standard for digital televi-
`sion (officially designated as ISO/IEC
`13818, in 9 parts).
`
`Multiple System Operator. A company that
`owns multiple cable systems.
`
`Program Clock Reference. PCR informa-
`tion is embedded into MPEG-II streams to
`accurately synchronize a program clock on
`the receiving system to the MPEG-II
`stream.
`
`50
`
`MSO
`
`PCR
`
`55
`
`3
`
`

`

`5
`
`EP 1 418 756 A2
`
`6
`
`VOD
`
`Video-On-Demand. The service of provid-
`ing content through subscriber selection off
`a large menu of options, available to a view-
`er at any time.
`
`[0013] Embodiments of the present invention will now
`be described by way of example with reference to the
`accompanying drawings, in which:
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0014] Figure 1 is a block diagram of a system for de-
`livering pre-encrypted video content, in accordance with
`the invention.
`[0015] Figure 2A is a diagram showing a changing-
`key encryption scheme for pre-encrypted content using
`a fixed crypto period, in accordance with the invention.
`[0016] Figure 2B is a diagram showing a changing-
`key encryption scheme for pre-encrypted content using
`a crypto period based on a fixed number of packets, in
`accordance with the invention.
`[0017] Figure 2C is a diagram showing a changing-
`key encryption scheme for pre-encrypted content using
`a crypto period delimited by a fixed number of MPEG-II
`I-frames, in accordance with the invention.
`[0018] Figure 2D is a diagram showing a changing-
`key encryption scheme for pre-encrypted content using
`a "random" crypto period, in accordance with the inven-
`tion.
`
`DETAILED DESCRIPTION OF EMBODIMENTS OF
`THE INVENTION
`
`[0019] The invention relates to conditional access and
`copy protection techniques and more particularly to
`such techniques for interactive, on-demand digital pro-
`gram content such as video-on-demand (VOD) pro-
`gramming distributed via cable and satellite networks.
`[0020]
`In order to protect against interception and
`copying of digital program content, a pre-encryption pro-
`cedure is employed whereby server-based VOD con-
`tent is stored in an encrypted form, then delivered di-
`rectly to viewers without further encryption processing.
`The VOD content is encrypted at the point where it is
`encoded, and is distributed to content resellers (e.g.,
`MSO's, satellite operators, etc.) in encrypted form. Con-
`tent encoders generally do not distribute directly to end-
`users (viewers). Typically, encryption is accomplished
`separately and uniquely for each reseller.
`[0021] Figure 1 is a block schematic diagram of a sys-
`tem 100 for delivery of pre-encrypted program content,
`within which an embodiment of the present invention
`can be incorporated. The system 100 is suitably a con-
`ditional access system (CAS) which is a system for
`granting conditional access to certain digital content
`(movies, etc.), the "conditions" being licensing condi-
`tions (fee paid, access granted starting on date xx/xx/
`xx at xx:xx until yy/yy/yy at yy:yy, etc.). It is noted that
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`4
`
`although the entire system 100 is not typically included
`in one CAS, it could be.
`[0022] At a content encoder's location 110, master
`content 112 (e.g., movies and other program content) is
`encoded into digital form via a suitable (e.g., MPEG-II)
`encoder 114. This content is then encrypted in an en-
`cryption system 116, to be "encrypted content." A con-
`tent authorization system 118 is used to, e.g., manage,
`renew and verify valid licensing for the encrypted con-
`tent. This can permit, for example, encryption by the en-
`cryption system 116 only if valid licensing exists for any
`particular destination. At a minimum, system 118 will
`control whether encryption can occur, independently of
`content destination. The encryption system 116 can
`generate a "personalized" encryption for each destina-
`tion content reseller (e.g., MSO). Such a feature is not,
`however, required. Instead, the same encryption proc-
`ess could be used for a plurality of different MSOs. The
`encrypted content is transmitted via a transmitter (XMIT)
`120 over a suitable transmission medium 140 to a re-
`ceiver 132 at a reseller's location 130. The transmission
`medium is shown as being a satellite, but it can be the
`Internet, a cable network, or any other suitable delivery
`mechanism.
`[0023] The receiver 132 receives the encrypted con-
`tent and stores it in a VOD server 134 from which it can
`be re-transmitted to end-users. A system manager 136
`(e.g., computer system that controls operation of a re-
`seller's various transmission and communications re-
`sources) communicates with the encryption system 116
`to make requests for program content, and to receive
`encryption records (ER) defining how the requested pro-
`gram content is encrypted/encoded and to receive en-
`titlement control messages (ECMs) associated with the
`encryption of the program content. Typically, the encryp-
`tion system 116 and the system manager 136 are parts
`of an ECM Renewal System (ERS) by which authoriza-
`tions to distribute/decode program content are man-
`aged and renewed. It should be appreciated, however,
`that the ECM renewal can be separate from the other
`functions included in encryption system 116. As an ex-
`ample, a centralized ERS can be provided. It is also not-
`ed that the System Manager 136 would typically be pro-
`vided by the VOD vendor, although it may be provided
`by others.
`[0024] At the reseller's (e.g., MSO's) location, a user
`authorization system 138 ("VOD Auth.") receives re-
`quests from end users for program content, and verifies
`that appropriate authorizations are in place for the end
`user to view the requested content. If the appropriate
`authorizations are in place, then the user authorization
`system 138 instructs the VOD server 134 to deliver the
`requested (encrypted) content to the user's VOD play-
`back device 150 (e.g., set-top box) and generates an
`Entitlement Management Message (EMM) for the re-
`quested content for delivery to the VOD playback device
`150, along with the requested content. In an alternate
`embodiment, the EMM is sent well in advance, e.g., from
`
`

`

`7
`
`EP 1 418 756 A2
`
`8
`
`the CAS.
`[0025] An ECM contains encryption information spe-
`cific to the program content which, in combination with
`a valid EMM, can be used to derive a decryption key for
`decrypting the content. ECMs are typically embedded
`within the program content, and due to the encryption
`mechanisms employed cannot be used to derive valid
`encryption keys absent a valid EMM for the content.
`EMMs may also include conditional access information,
`such as information about when, how many times, and
`under what conditions the content may be viewed/
`played.
`[0026] Those skilled in the art will appreciate that
`when the inventive concepts are used with pre-encrypt-
`ed content, ECM authorizations will change over time.
`Thus, ECM data embedded in the content will need to
`be updated with "renewed" ECMs, or ECMs with author-
`izations based on subscriber specific rights (for example
`to copy one or more times). With multiple key changes
`in the content, the server (which "plays out" the content
`with the ECMs) must know when to switch ECM sets
`from one crypto period to the next. Several methods to
`accomplish this synchronization are disclosed herein. It
`should also be appreciated that the decoder will decrypt
`(if it has the proper ECMs) by looking at the transport
`scrambling control bits in the MPEG packet headers.
`[0027] A technique that can be used to improve the
`security of encrypted streaming content such as VOD
`content is to change the cryptographic keys (encryption
`keys) at a plurality of points within the content. In order
`to make it more difficult for "pirates" to steal these keys,
`it is desirable to use as many different cryptographic
`keys as possible to encrypt one item of content. How-
`ever, this creates a number of new issues:
`
`1) Determining the number of sets of cryptographic
`keys that should be employed to encrypt one item
`of content, and determining an upper limit on how
`frequently keys can be changed.
`
`2) Determining how and where, within the program
`content, to effect the cryptographic key changes,
`and how to encode those key changes.
`
`3) Determining how to communicate the crypto-
`graphic key sets to VOD servers.
`
`4) Determining how to synchronize cryptographic
`key changes with the corresponding ECMs when
`the content is streamed to the consumer at time of
`purchase..
`
`5) Determining how to handle the ECM renewal
`process.
`
`[0028] The inventive technique addresses these is-
`sues by defining a cryptographic key change methodol-
`ogy that permits rapid key changes with straightforward,
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`5
`
`simple key change synchronization at the time of de-
`cryption. This is accomplished, in part, by taking advan-
`tage of the MPEG-II data stream structure.
`[0029] Present encryption schemes employ a simple,
`conventional two-key encryption technique to encrypt
`VOD content. Both keys taken together are essentially
`a single "cryptographic key set" used to encrypt the en-
`tire content. For example, symmetric (i.e., private) keys
`can be used for encryption. In an alternate implementa-
`tion, one of the keys can comprise a "public key", and
`be delivered with the content. The other key is required
`in combination with the public key to decrypt the content,
`and is delivered as part of a successful authorization or
`licensing process. Neither key is useful absent the other
`key. Although a public key implementation is possible,
`a private key approach is currently the preferred imple-
`mentation.
`[0030] A problem with encrypting the VOD content
`with a single set of keys is that an aggressive "attack"
`using exhaustive cryptographic "cracking" techniques
`(e.g., a "brute force" approach) could discover a set of
`keys that will decode the content. Once broken, the con-
`tent can be reproduced "in the clear" (i.e., unencrypted),
`thereby completely thwarting the security offered by the
`encryption scheme. As is well known in the art, key size
`is a factor in minimizing the likelihood of a successful
`brute force attack.
`[0031] For highest security and greatest protection
`against cryptographic "cracking" attacks by "pirates", it
`is highly desirable to increase the number of separate
`cryptographic keys used by changing the keys at nu-
`merous points during the encryption process. The great-
`er the number of "crypto periods" (separately encrypted
`segments of the content), the more difficult it becomes
`to "crack" the encryption scheme. If, for example, cryp-
`tographic keys were to be changed every 0.5 seconds
`within a VOD stream (i.e., a crypto period of 0.5 sec-
`onds), then the would-be "pirate" would be forced to
`crack the encryption scheme for each and every 0.5 sec-
`onds of content. Each successful breach of encryption
`security would only produce 0.5 seconds of "clear" (un-
`encrypted) content. For a 90 minute movie, this would
`require 10,800 separate successful breaches of the en-
`cryption scheme. Given the time and effort required to
`accomplish each breach, this presents a formidable bar-
`rier to piracy.
`[0032] The inventive technique maintains all crypto-
`graphic keys separate from the encoded/encrypted con-
`tent. A set of ECMs (Entitlement Control Messages)
`conveying information about a set of keys is multiplexed
`into the VOD stream by the VOD server when delivering
`the VOD content to an end user's VOD playback device
`(e.g. set-top box). A separate EMM (Entitlement Man-
`agement Message) from an authorization system is de-
`livered to the VOD playback device. The EMM contains
`the remaining information required to decode/decrypt
`the VOD content.
`[0033] There are two points in the streaming VOD de-
`
`

`

`9
`
`EP 1 418 756 A2
`
`10
`
`livery process that dictate the practical upper limit on
`how frequently keys can be changed within VOD con-
`tent: the VOD server and the set-top box. Since the con-
`tent can be encoded "off-line", in a non real-time fashion,
`there is virtually no practical limit to how frequently cryp-
`tographic keys can be changed on the encoding/encryp-
`tion side of the process. However, the VOD server and/
`or the set-top box may operate in real-time. VOD server
`limitations on how frequently ECMs can be multiplexed
`into the VOD stream to the set-top box set a first upper
`limit on key change frequency. The rate at which the set-
`top box can switch encryption keys as a part of its de-
`cryption process sets a second upper limit. The maxi-
`mum rate at which cryptographic keys can be changed
`is determined by the smaller of these two upper limits.
`[0034] The inventive technique for implementing rap-
`id cryptographic key changes uses any of four different
`basic schemes (techniques, methodologies) for break-
`ing up (subdividing, segmenting, sectioning) the content
`to be encoded/encrypted into a plurality of "crypto peri-
`ods", covered by different cryptographic keys. These
`are:
`
`1) Fixed crypto period: Define a crypto time interval
`and change the key each time the crypto time-inter-
`val passes.
`
`2) Fixed number of packets: Determine a number
`of content packets "n" corresponding to a suitable
`time interval and change the cryptographic key eve-
`ry "n" packets.
`
`3) Fixed "marker" count: Using a suitable MPEG-II
`field type as a "marker", such as an I-frame header,
`change the cryptographic key every time "n" mark-
`ers have passed in the stream, where "n" is selected
`to produce a suitable crypto period. The MPEG-II I-
`frame header is one example of a suitable "marker."
`Alternatively, any other suitable, recurring MPEG-II
`encoding element could be used as a stream "mark-
`er" to delimit segments of the MPEG-II stream.
`
`4) Random crypto period: Change the crypto-period
`randomly within upper and lower constraints on
`crypto period, using a pseudo-random algorithm.
`Calculate a number of packets for each crypto pe-
`riod and change the key after that number of pack-
`ets. Generate an index file indicating at which pack-
`et numbers the encryption key should be changed.
`It is noted that instead of using a packet count to
`define each crypto period, a time interval could be
`used.
`
`[0035] For the sake of ensuring clarity of the terminol-
`ogy used herein, to "encode" does not necessarily mean
`to "encrypt." All encryption is encoding, of a sort. The
`conversion to MPEG is an encoding process. The proc-
`ess of securing with cryptographic keys is encryption.
`
`Both encoding and encryption are performed on the pro-
`gram content. The data stream which is segmented, and
`for which keys are changing, is essentially the encrypted
`(e.g., by 116) data stream, which has previously been
`encoded (e.g., by 114).
`[0036] Figures 2A-2D illustrate these four schemes
`for breaking up the content to be encoded/encrypted in-
`to a plurality "crypto periods."
`
`5
`
`10
`
`Fixed crypto period
`
`[0037] Under this encoding/encryption scheme, the
`encoding system picks (selects) a suitable time interval
`(crypto period) consistent with the known performance
`limitations of elements of the VOD delivery and playback
`infrastructure. Assuming MPEG-II encoding, the encod-
`ing/encryption system can use the PCR (Program Clock
`Reference) headers embedded in an MPEG-II stream
`of an item of program content to determine the exact
`amount of program time that has passed at any point in
`the stream. An initial cryptographic key is generated and
`encryption of the stream begins with the initial key.
`When analysis of the PCR information in the MPEG-II
`stream indicates that the crypto period has passed, a
`new key is generated and encryption resumes at the
`next MPEG-II "packet" using the new key. This new key
`is used until the PCR information once again indicates
`that the crypto period has passed since the key was
`changed, and the process repeats until the end of the
`stream, generating a new encryption key for each sub-
`sequent segment of the stream equivalent to a crypto
`period of program time. Each encryption key is saved
`for encoding into a set of ECMs for the encoded/encrypt-
`ed program content. Alternatively, ECMs may be gen-
`erated and saved as content is encrypted. The ECM set
`is provided to the VOD reseller (e.g., MSO) upon com-
`pletion of licensing/authorization of rights to the program
`content. An encryption record (ER) is also generated,
`describing the scheme by which the program content
`was encoded/encrypted and the number of associated
`ECMs. In another approach, the ERS can take the orig-
`inal ECM set and "retrofit" (i.e., modify) it for each VOD
`reseller's conditional access system. The ER conveys
`information which permits such an implementation.
`[0038] Figure 2A illustrates this fixed crypto period
`encoding scheme 200a, showing an encoded/encrypt-
`ed MPEG-II stream 202, divided into a plurality of seg-
`ments 204. Each segment corresponds to a series of
`MPEG-II packets covered by a crypto period defined by
`a fixed time interval ΔT. Each segment 204 is encrypted
`according to a different encryption key, used to generate
`an ECM 206 associated with each separately encrypted
`crypto period. The ECMs 206 are maintained separately
`from the encrypted MPEG-II stream 202.
`
`Fixed number of packets
`
`[0039]
`
`In a manner similar to that of the fixed crypto
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`6
`
`

`

`11
`
`EP 1 418 756 A2
`
`12
`
`period scheme, this scheme initially determines a suit-
`able crypto period. However, unlike the fixed crypto pe-
`riod scheme, the "fixed number of packets" scheme then
`examines the encoding of the MPEG-II stream for an
`item of program content to determine a suitable number
`"n" of MPEG-II packets which correspond to a crypto
`period. A sufficient extra number of packets in "n" is al-
`lowed to account for any variability inherent to MPEG-II
`encoding and to ensure that no MPEG-II segment of "n"
`packets will exceed the VOD distribution/playback sys-
`tem's key processing capabilities. It should be appreci-
`ated that the streaming content being encrypted com-
`prises a sequence of packets. An initial key is chosen,
`and encryption of the MPEG-II stream begins, changing
`the key after each "n" MPEG-II packets in the stream.
`The number of packets per time interval can vary dra-
`matically.
`[0040] As in the fixed crypto period scheme, the en-
`cryption key for each "n" packets is saved for encoding
`into a set of ECMs (ECM1, ECM2 ...) for the encoded/
`encrypted program content. Alternatively, as noted
`above, the ECMs can be generated (e.g., in real time)
`and saved as content is encrypted. The ECM set is pro-
`vided to the VOD reseller (e.g., MSO) upon completion
`of licensing/authorization of rights to the program con-
`tent, and an encryption record (ER) is also generated,
`describing the scheme by which the program content
`was encoded/encrypted and the number of associated
`ECMs. As previously indicated, the ERS could take the
`original ECM set and modify it for each VOD reseller's
`CAS.
`[0041] Figure 2B illustrates an encoding scheme
`200b that uses a fixed number of MPEG-II packets per
`crypto interval. An encoded/encrypted MPEG-II stream
`202 is divided into segments of "n" MPEG-II packets
`each, where "n" represents the number of MPEG-II
`packets that correspond to a suitable period of program
`time to be used as a crypto period. Each segment 204
`is encrypted according to a different encryption key,
`used to generate an ECM 206 associated with each sep-
`arately encrypted crypto period. The ECMs 206 are
`maintained separately from the encrypted MPEG-II
`stream 202.
`
`Fixed "marker" count
`
`[0042]
`In this scheme, using a suitable, recurring ele-
`ment of MPEG-II encoding as a stream segment delim-
`iter (marker), a number "n" of stream segments is deter-
`mined that correspond to a suitable crypto period. The
`stream is then encrypted in "crypto segments" defined
`by "n" markers. The markers can optionally be transmit-
`ted "in the clear", (i.e., unencrypted) to facilitate decod-
`ing/decryption. Each crypto segment is encrypted using
`a different cryptographic key.
`[0043]
`In a manner like that of the "fixed number of
`packets" scheme, the encryption key for each "n" pack-
`ets is saved (or generated and then saved) for encoding
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`7
`
`into a set of ECMs for the encoded/encrypted program
`content. The ECM set is provided to the VOD reseller
`(e.g., MSO) upon completion of licensing/authorization
`of rights to the program content, and an encryption
`record (ER) is also generated, describing the scheme
`by which the program content was encoded/encrypted
`and the number of associated ECMs.
`[0044] Figure 2C illustrates an encoding scheme
`200c that uses MPEG-II "markers" 208 to delimit crypto
`intervals in the MPEG-II stream. An encoded/encrypted
`MPEG-II stream 202 is divided into a plurality of seg-
`ments 204 delimited by a number "n" of "markers" 208.
`Each segment corresponds to a series of MPEG-II pack-
`ets delimited by "n" markers 208 ("n" = 2 in the figure).
`A marker 208 can be any suitable recurring element of
`MPEG-II encoding, such as an I-frame header (shown
`in the Figure, as "I"). The number "n" is chosen such that
`each segment corresponds roughly to a suitable amount
`of program time for a crypto period. The markers 208
`are transmitted "in the clear" to facilitate their identifica-
`tion during the decoding/decryption process. Each seg-
`ment 204 is encrypted according to a different encryp-
`tion key, used to generate an ECM 206 associated with
`each separately encrypted crypto period. The ECMs
`206 are maintained separately from the encrypted
`MPEG-II stream 202.
`
`"Random" crypto period
`
`[0045] Using this scheme, suitable upper and lower
`limits are selected for crypto periods within the perform-
`a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket