This invention relates in general to broadband communications systems, and more particularly, to controlling the timing of encryption key changes associated with services in the broadband communications system.
Conditional access systems, such as satellite, cable television, and direct subscriber line (DSL) systems, often encrypt services that subsequently must be decrypted with encrypting keys prior to viewing. Encryption devices encrypt these services using a series of keys that change on a regular basis to ensure protection of the content. The time interval during which a single key is used is called a cryptoperiod. For example, an encrypting key may change every four (4) seconds; therefore, a cryptoperiod including a changed encrypting key is transmitted every 4 seconds from each encryption device for each encrypted service.
Decoder devices, such as set top boxes, receive the services along with periodic encryption messages, which require timely processing in order to decrypt the received services. Importantly, messages containing the encrypting keys (often embedded within Entitlement Control Messages called ECMs) received by a set top box or other host device are important elements for proper functioning in a conditional access system. Namely, ECMs must be processed within the given time window, for example, every 4 seconds, in order to avoid service interruptions, such as video or audio artifacts. Note that different conditional access technologies use various means for transmission of service encryption keys, which may be included within ECMs and/or other messages, but for the purposes of this application, the term ECMs is meant to include all messages sent in conjunction with, and associated with changes to, the service encryption key.
Often, ECMs are processed by a CAS client on a secure microprocessor device within the set top box or other host device. The secure microprocessor is often single threaded with limited input/output (I/O) bandwidth, and yet must be able to handle the processing load for ECMs of multiple services. As a result, if the number of services requiring decryption increases, the processing demand on the secure microprocessor will also increase, and the chance that multiple ECMs will require simultaneous processing also increases. If this ECM processing demand is not met, especially the demand for processing of multiple simultaneous ECMs, there is a risk of service interruptions. Additionally, it is extremely prohibitive to upgrade the capabilities of the secure microprocessor after it is deployed. Thus, there exists a need for a more efficient system and method that eliminates or at least limits cases where ECMs, or other real-time messages in the encryption system required for decryption of services, from multiple services would need to be processed simultaneously.
The invention can be better understood with reference to the following drawings. The components in the drawings are not necessarily drawn to scale, emphasis instead being placed upon clearly illustrating the principles of the invention. In the drawings, like reference numerals designate corresponding parts throughout the several views.
Preferred embodiments of the invention can be understood in the context of a broadband communications system. Note, however, that the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. All examples given herein, therefore, are intended to be non-limiting and are provided in order to help clarify the description of the invention.
The present invention is directed towards synchronizing a timebase of headend devices that transmit real-time messages, such as ECMs or other messages related to transmission of keys that decrypt incoming services in an encryption system. More specifically, headend devices create cryptoperiods, which involve transmission of real-time messages, in accordance with a common crypto-sync pulse. In this manner, various headend devices are then synchronized. Subsequently, services that are encrypted and transmitted by the headend devices are assigned a time offset value from the common crypto-sync pulse. Accordingly, the cryptoperiod for each service starts at its assigned time offset value. By assigning the time offset values using a suitable algorithm, the chances that a decoder device receives two services that contain co-timed cryptoperiods, which require timely processing of the included real-time message, are dramatically minimized. Advantageously, the decoder devices are then capable of processing the real-time messages in a timely manner while avoiding service interruptions.
Also included in the set top box 250 are a host processor 450 and a conditional access (CAS) client 455. The host processor 450 is a generic, non-CAS specific processor, which initiates commands to and waits for responses from the CAS client 455. The real-time messages associated with the CAS are received by the host processor 450. The host processor 450 then sends an appropriate command to the CAS client 455 via an I/O link in order to process the CAS message. The CAS client 455 then processes and produces a decryption message in order to decrypt the incoming services and responds back to the host processor 450. The CAS client 455 then waits for another command. Once the host processor 450 receives the CAS client response, the host processor 450 sends the decryption response, which may be a decryption key, an encrypted version of the decryption key, or some other message, to the primary and/or secondary decryptors 430, 435. As previously mentioned, the CAS client 455 is typically a single threaded device with limited I/O bandwidth, so when real-time messages, e.g., ECMs, are simultaneously received, for example, when the tuner system 405 is receiving a plurality of services that require decryption, the CAS client 455 is not capable of simultaneously processing the simultaneous commands.
In accordance with the present invention,
In accordance with the present invention,
In accordance with the present invention,
In accordance with the present invention,
Accordingly, systems and methods have been provided that allow encryptor devices to provide real-time messages having offset cryptoperiods according to an offset algorithm within a common crypto-sync pulse boundary. Example algorithms were described herein; however, there may include any number of algorithm options that include both hardware and software. Additionally, examples herein show 100 even-sized slots in a crypto-sync pulse boundary, but there may be any number of slots as well as including some slots that are larger than other slots. It will be appreciated that further embodiments are envisioned that implement the invention, for example, using all software or adding modes for additional features and services.
| Number | Name | Date | Kind |
|---|---|---|---|
| 5224161 | Daniel et al. | Jun 1993 | A |
| 5349641 | Coutrot et al. | Sep 1994 | A |
| 5742677 | Pinder | Apr 1998 | A |
| 5870474 | Wasilewski | Feb 1999 | A |
| 5933503 | Schell et al. | Aug 1999 | A |
| 6005938 | Banker | Dec 1999 | A |
| 6020982 | Yamauchi et al. | Feb 2000 | A |
| 6105134 | Pinder | Aug 2000 | A |
| 6148082 | Slattery et al. | Nov 2000 | A |
| 6157719 | Wasilewski | Dec 2000 | A |
| 6173400 | Perlman et al. | Jan 2001 | B1 |
| 6230269 | Spies et al. | May 2001 | B1 |
| 6246767 | Akins | Jun 2001 | B1 |
| 6252964 | Wasilewski | Jun 2001 | B1 |
| 6292568 | Akins | Sep 2001 | B1 |
| 6345307 | Booth | Feb 2002 | B1 |
| 6356971 | Katz et al. | Mar 2002 | B1 |
| 6424714 | Wasilewski | Jul 2002 | B1 |
| 6424717 | Pinder | Jul 2002 | B1 |
| 6510519 | Wasilewski | Jan 2003 | B2 |
| 6516412 | Wasilewski | Feb 2003 | B2 |
| 6526508 | Akins | Feb 2003 | B2 |
| 6560340 | Akins | May 2003 | B1 |
| 6574609 | Downs et al. | Jun 2003 | B1 |
| 6727944 | Adachi | Apr 2004 | B1 |
| 6744892 | Akins | Jun 2004 | B2 |
| 6748080 | Russ et al. | Jun 2004 | B2 |
| 6804357 | Ikonen et al. | Oct 2004 | B1 |
| 6937729 | Akins | Aug 2005 | B2 |
| 6970564 | Kubota et al. | Nov 2005 | B1 |
| 6971008 | Wasilewski | Nov 2005 | B2 |
| 7062658 | Cheriton et al. | Jun 2006 | B1 |
| 7065216 | Benaloh et al. | Jun 2006 | B1 |
| 7124303 | Candelore et al. | Oct 2006 | B2 |
| 7127619 | Unger et al. | Oct 2006 | B2 |
| 7155609 | Chan et al. | Dec 2006 | B2 |
| 7181010 | Russ et al. | Feb 2007 | B2 |
| 7200868 | Mattox et al. | Apr 2007 | B2 |
| 7287168 | Candelore et al. | Oct 2007 | B2 |
| 7505592 | Russ et al. | Mar 2009 | B2 |
| 7515712 | Wasilewski et al. | Apr 2009 | B2 |
| 7519999 | Sedacca | Apr 2009 | B2 |
| 7636846 | Eskicioglu | Dec 2009 | B1 |
| 20010006400 | Kubo et al. | Jul 2001 | A1 |
| 20020013772 | Peinado | Jan 2002 | A1 |
| 20020018130 | Suemoto et al. | Feb 2002 | A1 |
| 20020026582 | Futamura et al. | Feb 2002 | A1 |
| 20020099663 | Yoshino et al. | Jul 2002 | A1 |
| 20020101990 | Morino et al. | Aug 2002 | A1 |
| 20020146237 | Safadi | Oct 2002 | A1 |
| 20020196939 | Unger et al. | Dec 2002 | A1 |
| 20030009668 | Chan | Jan 2003 | A1 |
| 20030021412 | Candelore et al. | Jan 2003 | A1 |
| 20030026423 | Unger et al. | Feb 2003 | A1 |
| 20030035543 | Gillon et al. | Feb 2003 | A1 |
| 20030046686 | Candelore et al. | Mar 2003 | A1 |
| 20030081776 | Candelore et al. | May 2003 | A1 |
| 20030093680 | Astley et al. | May 2003 | A1 |
| 20030145329 | Candelore et al. | Jul 2003 | A1 |
| 20030159140 | Candelore et al. | Aug 2003 | A1 |
| 20030174837 | Candelore et al. | Sep 2003 | A1 |
| 20030182579 | Leporini et al. | Sep 2003 | A1 |
| 20030188164 | Okimoto et al. | Oct 2003 | A1 |
| 20030233558 | Lieberman | Dec 2003 | A1 |
| 20040022307 | Dale et al. | Feb 2004 | A1 |
| 20040052377 | Mattox et al. | Mar 2004 | A1 |
| 20040073917 | Pedlow et al. | Apr 2004 | A1 |
| 20040098591 | Fahrny | May 2004 | A1 |
| 20040098603 | Corinne | May 2004 | A1 |
| 20040123094 | Sprunk | Jun 2004 | A1 |
| 20040128499 | Peterka et al. | Jul 2004 | A1 |
| 20040187014 | Molaro | Sep 2004 | A1 |
| 20040228175 | Candelore et al. | Nov 2004 | A1 |
| 20050080497 | Rao | Apr 2005 | A1 |
| 20050091173 | Alve | Apr 2005 | A1 |
| 20050100162 | Alve et al. | May 2005 | A1 |
| 20050102513 | Alve | May 2005 | A1 |
| 20050102702 | Candelore et al. | May 2005 | A1 |
| 20050105732 | Hutchings et al. | May 2005 | A1 |
| 20050169473 | Candelore et al. | Aug 2005 | A1 |
| 20050180568 | Krause | Aug 2005 | A1 |
| 20050192904 | Candelore et al. | Sep 2005 | A1 |
| 20050201559 | Van Der Heijden | Sep 2005 | A1 |
| 20050237396 | Hagiwara et al. | Oct 2005 | A1 |
| 20050240974 | Hiramoto et al. | Oct 2005 | A1 |
| 20060020786 | Helms et al. | Jan 2006 | A1 |
| 20060039256 | Nakamura et al. | Feb 2006 | A1 |
| 20060041905 | Wasilewski | Feb 2006 | A1 |
| 20060072752 | Nakano et al. | Apr 2006 | A1 |
| 20060074807 | Gauba et al. | Apr 2006 | A1 |
| 20060115083 | Candelore et al. | Jun 2006 | A1 |
| 20060153379 | Candelore et al. | Jul 2006 | A1 |
| 20060179478 | Han et al. | Aug 2006 | A1 |
| 20060187951 | Ginzburg et al. | Aug 2006 | A1 |
| 20060200865 | Leake et al. | Sep 2006 | A1 |
| 20060262926 | Candelore et al. | Nov 2006 | A1 |
| 20060269060 | Candelore et al. | Nov 2006 | A1 |
| 20070099694 | McCarthy et al. | May 2007 | A1 |
| 20070150960 | Dubroeucq et al. | Jun 2007 | A1 |
| 20070189525 | Wajs | Aug 2007 | A1 |
| 20070192586 | McNeely | Aug 2007 | A1 |
| 20070204146 | Pedlow et al. | Aug 2007 | A1 |
| 20070291940 | Candelore et al. | Dec 2007 | A1 |
| 20070294170 | Vantalon et al. | Dec 2007 | A1 |
| 20070294178 | Pinder et al. | Dec 2007 | A1 |
| 20080005030 | Schlarb et al. | Jan 2008 | A1 |
| 20080137852 | Mamidwar | Jun 2008 | A1 |
| 20080170687 | Moors et al. | Jul 2008 | A1 |
| 20090028327 | Pinder | Jan 2009 | A1 |
| 20090031409 | Murray | Jan 2009 | A1 |
| Number | Date | Country |
|---|---|---|
| 0 782 296 | Jul 1997 | EP |
| 1 014 715 | Jun 2000 | EP |
| 1 447 983 | Aug 2004 | EP |
| 2 403 586 | Jan 2005 | EP |
| 1 760 619 | Mar 2007 | EP |
| WO 0050978 | Aug 2000 | WO |
| WO 0051041 | Aug 2000 | WO |
| WO 0182588 | Nov 2001 | WO |
| WO 2005029843 | Mar 2005 | WO |
| WO 2005029852 | Mar 2005 | WO |
| WO 2005091626 | Sep 2005 | WO |
| WO 2005101411 | Oct 2005 | WO |
| WO 2006038204 | Apr 2006 | WO |
| WO 2009015116 | Jan 2009 | WO |
| WO 2009018006 | Feb 2009 | WO |
| WO 2009042532 | Apr 2009 | WO |
| Number | Date | Country | |
|---|---|---|---|
| 20090080648 A1 | Mar 2009 | US |