METHOD TO IDENTIFY AT LEAST ONE CONTENT WITHIN A DATA STREAM

Abstract
A method to identify content within a data stream, comprising: capturing a data stream, analysing and filtering the data stream by isolating a test stream of the data stream and disabling the other sub-streams, applying the test stream to the application so as to produce an output, applying the output to a comparator, the comparator receiving a reference and determining by the comparator a distance between the application output and the reference, if the distance is below a predefined level, repeating the isolating step with a new test stream selected among the previous test stream, the new test stream being a subset of the previous test stream, if that the distance is above or equal a second predefined level, repeating the isolating step by selecting a different test stream from the data stream not already applied to the application.
Description
INTRODUCTION

The present invention concerns a method to identify at least one content within a data stream, said content being needed by a given application executed on a test device.


BACKGROUND ART

The aim of the invention is to detect content needed by a given application, whose implementation (hereafter the test device) is available as a “black-box” (i.e., a device that can be analysed externally by observing its reaction (output R) to different inputs I1, . . . In).


One particular field of application is Pay-TV field in which the content plays the role of security messages and the data stream is the video data broadcast by a satellite.


Some pirates use a satellite ISP or private satellite connection to broadcast via satellite the control words “CWs” (which are one example of the security messages) protecting a payTV operator's content. The control words are extracted from a genuine security module and spread to users having subscribed to this pirate service.


The Satellite Key Sharing pirate STBs or dongles will then only need satellite feeds to get either the video scrambled and the CW to descramble. The pirate decoder receives the audio/video stream in the same manner as the genuine user i.e., through satellite or terrestrial signal and connects in parallel their decoder to this CW stream service. The control word is then passed to the decoder to decrypt the audio/video content and to obtain the audio/video in clear. Each control word is used to encrypt a part of the audio and video stream (AN stream). A slice of NV stream encrypted with the same control word composes a crypto period.


Pirates may change the satellite ISP or private satellite connection very often, so identification of the pirate feed requires fast and automatic tools.


Furthermore, to identify illicit CWs within the satellite streams, the analyzing tools need to access to the satellite beams' footprint.


Depending on the location of the footprint and of the personnel performing the analysis operations, limited internet connectivity may be available between the two, hence requiring optimized solutions to reduce traffic.


As it is well known, in such Pay-TV systems that use a security module, the content is encrypted by means of control words and is then sent to multimedia units connected to a data or content supplier. The controls words are sent to multimedia units in an encrypted form in control messages (ECM). These control messages (ECM) are transmitted by the decoder of the multimedia unit to the security module of this unit. If the decryption rights are present, the control messages are decrypted in order to extract the control words. Said control words are returned to the decoder that uses them to decrypt the content.


BRIEF DESCRIPTION OF THE INVENTION

According to the invention, a method to identify at least one content within a data stream is provided, said content being needed by a given application executed on a device, this method comprising the steps of:


a) capturing at least one data stream,


b) analyzing and filtering the data stream by:


c) isolating at least one test stream of the data stream and disabling the other sub-streams, and applying the test stream to the application so as to produce an output (R),


d) applying the output to a comparator (comp), said comparator receiving a reference (R′) and determining a distance (D) between the application output (R) and the reference (R′), when the distance (D) is below a predefined level (L), repeating step c) with a new test stream selected among the previous test stream, the new test stream being a subset of the previous test stream, and


when the distance (D) is above or equal to a second predefined level (L2), repeating step c) by selecting a different test stream from the data stream not already applied to the application.





BRIEF DESCRIPTION OF THE FIGURE

The present invention will be better understood thanks to the attached figure in which the various elements of the invention are illustrated.



FIG. 1 illustrates the different elements playing a role in the present invention.





DETAILED DESCRIPTION

The test device (Tst_Dev) implements the application under examination. It is fed with the modified stream (M_S) comprising at least one test stream captured and filtered by the controlled filters (CF) and synchronized by the stream dispatcher (St_Dis). The application (R(x)) is implemented within the test device (Tst_Dev), however the latter is available as a “black box”. The output of the test device (Tst_Dev) if function of its internal status and of its inputs: Output=R(I1, . . . ,In, Status).


The controlled filters (CF) are in charge of capturing one or more data streams (S1, . . . ,Sn) (for instance, from one or more satellite(s)), and obtaining the modified stream containing the test stream from the data stream following the instructions of the stream selector and of handing over a new modified stream (hereafter the test streams Ix, . . . , Iy) to the stream dispatcher (St_Dis). This method requires at least one controlled filter. A controlled filter may disable some of the sub-stream of a data stream by one of the methods described below. A sub-stream is a part of the data stream identified by one or more common characteristics; the characteristic of the sub-stream is composed of a characteristic type (e.g., “packet identifier”, “IP Address”, “payload pattern”, etc.) or a characteristic value (e.g., the number of the packet identifier, a given IP Address, a mask of IP Address, a pattern for the payload, . . . ). The characteristic defining a given sub-stream is referred to herein as the SSC.


Three methods to disable part of the data stream, thus forming the modified stream are proposed. The non-disabled part of the data stream is called test stream. The first method is to remove the sub-streams that are not part of the test stream. The data stream is then cut to remove some of the sub-streams and only the test-streams are sent to the test device.


The second method is to modify the sub-streams that are not part of the test stream. This modification has the aim of avoiding the interpretation of the data by the test device. This can be achieved through the identification of the payload and the modification of said payload, either by a constant or by random data.


Another way to disable the data is to modify the header so that the rest of the data has no meaning.


The third method is to act on the signalization of the data stream. The data stream comprises a signalization table (PAT) describing all available services, the services being then linked to a plurality of sub-streams. This table will be modified to hide some of the services to leave in the data stream only the test-streams visible.


The stream forwarded by the controlled filter to the stream dispatcher is the modified data stream (M-S). The modified stream comprises at least the test streams and, depending on the disabling method, the other sub-streams.


The stream dispatcher (ST_Dis) receives the modified stream from the different controlled filters, ensures the synchronization among the modified stream and feeds it to the test device. The transfer of the feeds between the controlled filters and the stream dispatcher may happen remotely (e.g., via the internet), hence the bandwidth between the components may be a critical factor and the modified stream to be forwarded to the stream dispatcher must be accordingly selected by the stream selector. In the particular case of Pay-TV Satellite Key Sharing, the stream dispatcher has the function of synchronizing at least two streams, one being at least a modified stream and the other one being either a non-modified or a modified stream. The stream dispatcher synchronizes the modified stream (containing the test streams which contain the security messages embedding the control word) with the stream containing the audio/video content, in order to have the correct control word fed to the test device during each crypto period. The security messages can be any data of particular interest to be located into the data stream. In Pay-TV, we understand these messages to be the Entitlement Management Messages (EMM), containing the rights and various configuration for the security module or the Entitlement Control Messages (ECM) containing the control word. The stream of audio/video content can also be filtered to have a modified stream having only a subset of services.


The comparator (Comp) receives the input of the test device and compares it to a reference output R′ (for example, for the SKS, R′=the presence of descrambled video in the TV). The comparator provides to the stream selector an indicator of the distance D between the output of the test device and the reference output R′: D=(d(R(I1, . . . In status), R′). A first predefined level L1 is then used to decide if the application is working satisfactorily and therefore the iterations can stop. The last test stream used, identified by the SSC, is then used for later analysis and action. When the distance D is above a second predefined level L2, the current test stream is discarded and other test streams are selected. The first and the second predefined level can have the same value. The value of the distance D between the first and the second predefined level is then used to determine that the test stream is promising but not precise enough to stop the iteration. This test stream is then used to define a smaller test stream within the previous test stream. This first predefined level L1 is defined according to the kind of application being analyzed. For example, in the case of Pay TV Satellite Key Sharing, R′=“image is descrambled” and the distance D(R,R′)=0 if the test device is able to descramble the NV stream contained in one of the data streams by using the control words used in the test stream currently tested. In this case, we have a go/nogo status for the first and second predefined level. They have in this case the same value. The comparator can also decide to stop the iteration process until the granularity of the test stream is sufficiently small to be identified. In the case of an IP stream, the first iteration will be the whole IP stream. In the successive iterations, the SSC value can then change to either refine the range of the IP address or by selectively testing all IP addresses of the IP data stream.


The comparator, stream dispatcher and test device jointly constitute an analysis module.


The analysis described herein is performed as successive analysis iterations. Each analysis iteration generates a distance D calculation by the comparator. At each analysis iteration, the stream selector adjusts the parameters of the controlled filter until D=0. In order to do so, the stream selector instructs the controlled filter to generate appropriate test streams such that the amount of disabled sub-streams is increased at each analysis iteration. When the maximum level of granularity such that D=0 has been reached, the stream selector interrupts the process, provides as an output the last (e.g., most restrictive) values of the controlled filter that have led to D=0 and declares an identification success. Depending on the nature of the data stream input to the controlled filter, the granularity of the filtering may be at a Satellite Transport Stream level, at PID level, at an IP address level, or it may depend on any other information related to the header or to the content of the packets present in the data streams (i.e., pattern of the data packets). The granularity of the filtering may vary between two analysis iterations. In particular, it may be a given a hierarchical organization.


The successive analysis iteration is one method to converge to the content. The test stream is first selected from a large category, e.g., the streams having IP packets (as opposed to the streams having video data) for a first round of test. If the comparison is positive (i.e., the distance D is below the second predefined level L2 but not below the first predefined level L1), the controlled filter is set so has to have a finer granularity of the streams previously positively detected. In the negative case, the disabled streams of the previous round are now considered has having the content and these sub-streams are then applied to the controlled filter so has to elect one or more test streams among these sub-streams. This recursive approach allows a quick and efficient way to converge to the final sub-stream containing the content, until the comparator gives a distance value below the first predefined level L1.


This output of the stream selector can then sent to other modules that can take appropriate actions depending on the content of the output (e.g., generate emails, . . . )


The stream selector identifies the best strategy to modify the parameters of the controlled filters in order to minimize the overall time necessary to complete the analysis (i.e., to obtain the most restrictive parameters of the controlled filter such that D=0) and to minimize the instantaneous and total bandwidth necessary to transfer the test streams between the controlled filter and the stream dispatcher. In order to do so, the stream selector selects at each iteration which sub-streams must be removed or modified from the data stream (so as to keep only the test streams). The sub-stream characteristic (SSC) is used to determine which sub-stream will be part of the test stream. At each iteration, a new value or type is selected for the SSC by the stream selector via one of the following methods:

    • Sequential: The SSC type is fixed, the SSC value is modified with a known rule (random, predefined, learning, environment or a mix of those).within its possible ranges. (e.g., SSC type can be fixed to be of “IP address type”; then at each iteration the IP Address—e.g., the SSC value—is increased of one unit). This rule can be:
      • Random. The SSC value is modified randomly;
      • Predefined. The SSC value is modified with a predefined function (e.g., a fix constant value, unitary increase, two units decrease, . . . );
      • Current Analysis Learning (CAL): a memory is used to store the inputs/outputs of the previous analysis iterations (R, D, controlled filter configurations, previous SSC type/value). The CAL rule selects the modifications of the SSC value as a function of current inputs and its memory; or
      • General Experience Learning (GEL): a memory is used to store the inputs/outputs of the previous analysis in the form of the SSC previously positively detected (either on the same application or on other applications). The GEL rule selects the modifications of the SSC value as function of current inputs and its memory.
    • Adaptive: The SSC type and SSC value are modified with predefined conditions, i.e., known rules (predefined, learning, environment or a mix of those) within their possible ranges. (e.g., SSC type can be a “Transport stream, then PID, then IP Address” ; then at each iteration the SSC value—is increased by one unit).


The stream selector can predict the test streams where the content is most probably present and retrieve these streams in the right sequence, in order to save bandwidth and transmit only (or first) those to the test device. The likelihood of a test stream containing the content can be estimated by i) observations of the other Test Streams (patterns, behaviour, quantity of data that changes between two packets, . . . ) or ii) by prediction based on inferring from historical data (previous Analysis Iterations or previous analysis on the same application or other applications).


Since each test stream can contain a different number of data packets per second (i.e., different bandwidth), not all test streams have the same “analysis cost”. The stream selector hence considers—in addition to the other parameters already discussed:

    • test stream probability (the probability that a given test stream contains the content); and
    • test stream analysis cost (the cost to transfer/analyse that given test stream).


The test streams are sent to the analysis part in a way that minimizes the overall “analysis cost”, such that E[Ta] is minimal (E[x] represents the statistical average and Ta is the Total analysis cost) . Ta=SUM(Ti) ¦:i=1 to N; where N is the number of test stream analyzed before the identification success is declared. Ti is proportional to the “test stream bandwidth”. N is function of the Pi distribution (the probability that a given test stream contains the content). Hence the tool will calculate the best sequence, considering the probability and cost of each stream and finding the best trade-off.


In the determination of the best sequence, the stream selector also takes care of identifying the sequence that would maximize the efficiency jointly on the transmission and central analysis (e.g., to ensure that at no moment the analysis module is waiting because of lag on the transmission line, nor that too much data accumulates while waiting to be analyzed).

Claims
  • 1. A method to identify at least one content within a data stream, said content being needed by a given application executed on a test device, said method comprising the steps of: capturing at least one data stream;analyzing and filtering the data stream by:isolating at least one test stream of the data stream, disabling other sub-streams, and applying the test stream to the application so as to produce an output;applying the output to a comparator, said comparator receiving a reference and determining a distance between the application output and the reference, wherein:when the distance is below a predefined level, the isolating, disabling and applying steps are repeated with a new test stream selected among the previous test stream, the new test stream being a subset of the previous test stream, when the distance is above or equal to a second predefined level, the isolating, disabling and applying steps are repeated by selecting a different test stream from the data stream not already applied to the application.
  • 2. The method of claim 1, wherein the step of disabling the other sub-streams comprises the removal of the other sub-streams.
  • 3. The method of claim 1, wherein the step of disabling the other sub-streams comprises the corruption of the other sub-streams.
  • 4. The method of claim 1, wherein the data stream comprises signalization data indicating the sub-streams present in the data stream, and the step of disabling the other sub-streams comprises the removal of the indication of the other sub-streams in the signalization data.
  • 5. The method of claim 1, wherein the test stream is identified by a type or a value, and the step of isolating the test stream comprises the random selection of the type and/or value.
  • 6. The method of claim 5, further comprising a step of storing the type or value of the test stream for which the distance is below the first predefined level, and wherein in a subsequent analysis, a step of selecting the type or value for the test stream in which previous successful detection has been made.
  • 7. The method of the claim 5, further comprising a step of selecting primarily the type or value for the test stream according to predefined conditions.
  • 8. The method of claim 1, wherein the content is contained in security messages for conditional access multimedia data or other specified DVB metadata.
  • 9. The method of claim 8, wherein the data stream comprises a first data stream, in which the content is present and a second data stream comprising multimedia data, said method further comprising the steps of: capturing the first data stream;capturing the second data stream; andperforming the analyzing and filtering steps to the applying step to the first data stream, the test stream being synchronized with the second data stream before being applied to the application.
  • 10. The method of claim 1, wherein the application is a computer program executed by a processor.
  • 11. A system for identifying at least one content within a data stream, said content being needed by a given application executed on a test device, said system comprising: an analysis module adapted to capture at least one data stream, and analyze and filter the data stream by:isolating at least one test stream of the data stream, disabling other sub-streams, and applying the test stream to the application so as to produce an output;applying the output to a comparator within the module, said comparator receiving a reference and determining a distance between the application output and the reference, wherein:when the distance is below a predefined level, said module repeats the isolating, disabling and applying steps with a new test stream selected among the previous test stream, the new test stream being a subset of the previous test stream, when the distance is above or equal to a second predefined level, said module repeats the isolating, disabling and applying steps by selecting a different test stream from the data stream not already applied to the application.
  • 12. The system of claim 11, wherein the other sub-streams are disabled by removing the other sub-streams.
  • 13. The system of claim 11, wherein the other sub-streams are disabled by the corruption of the other sub-streams.
  • 14. The system of claim 11, wherein the data stream comprises signalization data indicating the sub-streams present in the data stream, and the other sub-streams are disabled by the removal of the indication of the other sub-streams in the signalization data.
  • 15. The system of claim 11, wherein the test stream is identified by a type or a value, and isolating the test stream comprises the random selection of the type and/or value.
  • 16. The system of claim 15, wherein the module stores the type or value of the test stream for which the distance is below the first predefined level, and wherein in a subsequent analysis, the module selects the type or value for the test stream in which previous successful detection has been made.
  • 17. The system of claim 15, wherein the module selects the type or value for the test stream according to predefined conditions.
  • 18. The system of claim 11, wherein the content is contained in security messages for conditional access multimedia data or other specified DVB metadata.
  • 19. The system of claim 18, wherein the data stream comprises a first data stream, in which the content is present and a second data stream comprising multimedia data, said module being further adapted to: capture the first data stream;capture the second data stream; andanalyze and filter the first data stream, the test stream being synchronized with the second data stream before being applied to the application.
  • 20. The system of claim 11, wherein the application is a computer program executed by a processor.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a National Stage of International Application No PCT/EP2012/054570, which claims priority to U.S. Provisional Patent Application Nos. 61/531,035 filed Sep. 5, 2011 and 61/531,145 filed Sep. 6, 2011.

PCT Information
Filing Document Filing Date Country Kind 371c Date
PCT/IB2012/054570 9/5/2012 WO 00 6/4/2014
Provisional Applications (2)
Number Date Country
61531035 Sep 2011 US
61531145 Sep 2011 US