1. Field of the Invention
The present invention relates generally to content access devices, such as digital broadcast/cable/satellite receivers/decoders, and more particularly to methods and systems for activating and registering such devices. The registration may be performed within a context of subscription based service providers.
2. Related Art
High-value content (e.g, audio, video, and multimedia content) is often distributed via subscription-based services. Subscription based services may range from a single program to entire channels or groups of channels. A typical subscription-based content delivery system is digital video broadcasting (DVB). When a DVB receiver (one example of a set-top unit or set-top box) tunes a DVB service (such as a satellite, digital terrestrial or digital cable signal), it may conventionally physically tune a given transponder which carries many DVB services in a multiplexed Program Transport Stream (MPTS). An associated demultiplexer extracts, through digital filters, different data streams relating to the expected services. The DVB receiver then builds from these different data streams a Single Program Transport Stream (SPTS), and processes the streams for display using a television coupled to the DVB receiver/decoder, for example.
Failure to provide secure subscription access to content, such as that conventionally carried by a DVB network, may result in theft of system identifiers or users' credentials (e.g., credit card information). Failure to make the subscription convenient may limit consumer acceptance of the system. A failure to ensure proper subscription information may lead to consumer problems and/or unauthorized access to content. Furthermore, failure to prevent unauthorized access by cloned consumer devices may also lead to unauthorized access to content. Any or all of these conditions may lead to disruptions in service, customer dissatisfaction, and lost revenue for a service provider.
In view of the above, there is a need for a method and an apparatus that enables an access device to register to receive digital content from a content provider, in particular a subscription based content provider. The method and apparatus according to the present invention allow for registering of the access device with the content provider, and subsequent secure communication between them, while preventing cloned devices from also accessing the content from the content provider.
The invention provides a method for enabling an access device to securely access content from at least a content provider while preventing a cloned access device from accessing such content. During registration of the access device with the content provider, the access device requests from a designated certificate authority a certificate having a public key of the content provider therein. Upon authentication of the certificate, the access device generates a key and uses the public key to exchange the key with the content provider. The key is then used for subsequent secure communications between the access device and the content provider. In this manner, a cloned device does not have access to the key and is unable to download content from the content provider.
In this regard, the invention provides a method for enabling an access device to access content, including audio/video programs, from a content provider comprising: receiving a certificate associated with a particular content provider; authenticating the certificate and determining unique data associated with the particular content provider; generating a key for communicating with the particular content provider; encrypting the key in response to the unique data determined from the certificate and transmitting the encrypted key to the particular content provider; requesting content from the particular content provider; and decrypting content received from the particular content provider using the key.
The invention also provides an apparatus for communicating with a content provider, the apparatus, comprising: a port for communicating with a plurality of content providers; memory having a first key and executable code stored therein for controlling the operation of the apparatus; a signal output for coupling output signals to a display device; and processor coupled to the port, memory, and signal output, the processor operative to cause the apparatus to: transmit a request for a certificate from a certificate authority; authenticate the certificate received from the certificate authority and determine unique data associated with a particular content provider; encrypt a key using the unique data associated with the particular content provider; transmit a request for content to the particular content provider; and decrypt content received from the particular content provider using the key.
The invention also provides a method for enabling an access device to access digital content from a content provider comprising: receiving authentication information associated with a particular content provider; processing the authentication information and determining unique data associated with the particular content provider included within the authentication information; generating a key for communicating with the particular content provider; encrypting the key in response to the unique data determined from the certificate and transmitting the encrypted key to the particular content provider; requesting content from the particular content provider; and decrypting content received from the particular content provider using the key.
Understanding of the present invention will be facilitated by consideration of the following detailed description of the preferred embodiments described purely by way of non-limiting example and taken in conjunction with the accompanying drawings, wherein like numerals refer to like parts and:
It is to be understood that the figures and descriptions of the present invention have been simplified to illustrate elements that are relevant for a clear understanding of the present invention, while eliminating, for purposes of clarity, many other elements found in typical set-top unit systems and methods of making and using the same. Those of ordinary skill in the art will recognize that other elements are desirable and/or required in order to implement the present invention. However, because these elements are well known in the art, a detailed discussion of such elements is not provided herein.
According to an aspect of the present invention, a system and method for providing secure subscription based services to access devices such as consumer set-top units, personal video recorders or other such digital terminal devices, may be provided. Such a system and method may serve to deter illegal cloning of the consumer devices, while offering a viable solution for providing high-value content (e.g., audio/video/multimedia content) in a networked environment.
Referring now to
A consumer who purchases or otherwise acquires an access device 110 generally registers the device, and subscribes to content offerings from content provider 120. Measures may be taken to frustrate unauthorized access to information sent between a subscribing device 110 and a content provider 120. Measures may also be taken to ensure that device requests for content from content provider 120 are authorized prior to fulfillment. Security codes may be automatically configured (rather than being user configurable) to mitigate the risk of these codes being used in connection with unauthorized devices. Cloning protection may be provided, such that if a access device 110 is cloned, attempted access by both the original and clone devices to content from content provider 120 using a single account may be prevented. A certificate based system and security key refreshing may also be employed according to the present invention. Key refreshing may be event based (e.g. content requests) and/or time-based (e.g. periodic key updates).
Referring now to
When a user acquires a access device 110, he may be advised to connect it to a display device, e.g., a television, a connection for receiving programming, such as satellite dish or cable, and a two-way communications network, such as a telephone line or direct subscriber line (DSL) or cable modem. In some cases, the connection for receiving the programs may serve as a two way communication network. Using the two-way communications network, the device 110 requests a certificate (block 220) from a selected content provider. An exemplary interface suitable for allowing a user to select a service provider is described in connection with
Referring to
For example, a certificate often takes the form of a file that is used for authentication purposes. A digital certificate may be issued to each content provider 120 by a Certificate Authority (CA). For example, a CA may use a CA private key Kpri to encrypt a digital certificate Cs containing a corresponding content provider's public key. A device 110 may contact a content provider 120, responsively to user selection of that content provider, to initiate a registration and subscription process by requesting certificate Cs via a two-way communications network. The communications network may support point-to-point communications between the device 110 and content provider 120.
As previously mentioned with respect to
Referring now also to
By way of further example, device 110 may encrypt the payment information using the extracted content provider public key Kpub, and content provider 120 may decrypt the received payment information using its private key Kpri. Content provider 120 may then process the decrypted payment information, such as by submitting an initial charge to a credit card company dependently upon the decrypted payment information. Content provider 120 may notify the transmitting device 110 that the payment information has been verified or accepted. Content provider 120 may also store the verified payment information for effecting later charges associated with the subscription, if any should occur.
Alternatively, a user may establish a subscriber account (including exchanging payment information) with a content provider 120 separate from system 100. In such a case, a user may optionally simply enter account information to be transmitted to a selected content provider 120 into a device 110, such as an account number and personal identification number (PIN) to initiate key exchange, for example.
Referring now also to
Referring now also to
By way of further example only, a content provider 120 may decrypt a received random number Kd encrypted with its public key Kpub using its private key Kpri. The content provider then checks the decrypted random number Kd to confirm there are no other sessions, or other devices, currently using the same Kd. If there are, the content provider 120 requests that the transmitting device 110 generate, encrypt and transmit another random number until a currently unused Kd is detected. Once a unique Kd is detected, the content provider accepts that Kd as the session key for the transmitting device, establishes a subscription account storing Kd in association with a device identifier, e.g., the serial number, and notifies the transmitting device of the acceptance. In response, the device 110 stores the key Kd in non-volatile, secure memory.
Subsequent secure communications between the transmitting device 110 and content provider 120 may be encrypted using Kd as a symmetric encryption/decryption key. For example, content requests sent from the transmitting access device 110 to content provider 120 may be encrypted using Kd, and content delivered form provider 120 to device 110 may be encrypted using Kd. In this manner, the key is generated and exchanged between the access device and the content provider during registration, and this key is used for subsequent secure communications between them. This method also prevents a cloned access device from receiving programs from the content provider since the cloned access device will not have the key for performing secure communications with the content provider.
For security reasons, and to frustrate unauthorized cloning efforts in particular, the shared secret key Kd may periodically be changed or refreshed. Alternatively, or additionally, a new key can be generated in response to each request for content access. Referring now also to
By way of further example only, according to an aspect of the present invention, a new key may be negotiated using the present key. For example, a new key Kd+1 may be encrypted and sent to a corresponding access device 110 from a corresponding content provider 120 using a key Kd over a point-to-point communication channel. In this way, only one device 110 has access to the key Kd+1. Once content provider 120 is assured that key Kd+1 has been received by the device 110 and decrypted, the content provider 120 and device 110 may make the previous key Kd inactive, and no longer accept or use it for transactions. Also, new key Kd+1 may be generated using old key Kd as the seed value.
Subsequent communications between the transmitting device 110 and content provider 120 are encrypted using Kd+1 as a symmetric encryption/decryption key. For example, content requests sent from the transmitting access device 110 to content provider 120 are encrypted using Kd+1, and content delivered form provider 120 to device 110 may be encrypted using Kd+1. Accordingly, even if device 110 is perfectly cloned, only one of the original and clone devices will be able to access restricted content, as the device that is not privy to the new key Kd+1 will not have access to the present shared encryption key.
According to an aspect of the present invention, additional key(s), such as a key Kc, may be generated and sent to a device 110 by a content provider 120. This key(s) may be used to encrypt actual content, while the key Kd (or refreshed key Kd+1) is used for other secure communications (such as exchanging key Kc).
Referring now to
Secure processor 1110 may take the form of a smart-card, by way of non-limiting example only. Smart-card 1100 may include first and second memory locations 1160, 1170, for storing two random numbers (Kd and Kd+1, Kd+1 and kd+2 . . . ). Smart card 1100 may also include secure memory location(s) for storing other keys, such as the aforementioned key Kc. The random number memories 1160, 1170 may take the form of a circular data buffer large enough to accommodate both keys and a flag indicating which key is the active key (either directly or indirectly). Smart card 1100 may further include a secure processor 1180.
“Memory”, as used herein, generally refers to one or more devices capable of storing data, such as in the form of chips, tapes or disks. Memory may take the form of one or more random-access memory (RAM), read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), or electrically erasable programmable read-only memory (EEPROM) chips, by way of non-limiting example only. The memory utilized by the processor may be internal or external to an integrated unit including the processor. For example, in the case of a microprocessor, the memory may be internal or external to the microprocessor itself. “Processor”, as used herein, refers generally to a computing device including a Central Processing Unit (CPU), such as a microprocessor. A CPU generally includes an arithmetic logic unit (ALU), which performs arithmetic and logical operations, and a control unit, which extracts instructions (e.g., processor executable code) from memory and decodes and executes them, calling on the ALU when necessary. Of course, other elements may be used, such as an electronic interface or Application Specific Integrated Circuit (ASIC), for example.
Public key store 1120 may take the form of memory for storing the list of public keys used to authenticate a content provider's certificate. Again, CA public key store 1120 need not be secured as it merely contains publicly available CA keys, though it may be.
Transceiver 1130 may take the form of a modulator/demodulator (modem) for communicating via a public switched telephone network (PSTN), for example. Alternatively, transceiver 1130 may take the form of suitable hardware and/or software for communicating with a broadband gateway device, such as a DSL or cable modem—in turn coupled to the global interconnection of computers and computer networks commonly referred to as the Internet.
Receiver 1140 may take the form of suitable hardware/software for receiving content transmitted by content provider 120. Receiver 1140 may be suitable for receiving point-to-point transmissions or broadcast transmissions. Receiver 1140 may take the form of a satellite television signal receiver, a cable television receiver or suitable hardware and/or software for communicating with a broadband gateway device, such as a DSL or cable modem—in turn coupled to the global interconnection of computers and computer networks commonly referred to as the Internet, all by way of non-limiting example only.
Play port(s) 1150 may be suitable for providing received content to a display device, such as a television. In the case of encrypted content, the content may be decrypted or otherwise made suitable for display using processor 1180 of smart-card 1110. Port(s) 1150 may take the form of coaxial RF ports and associated hardware/software, signal component ports and associated hardware/software and/or a high density multimedia interface (HDMI) port and associated hardware/software, all by way of non-limiting example only.
Referring now to
It will be apparent to those skilled in the art that various modifications and variations may be made in the apparatus and process of the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention cover the modification and variations of this invention provided they come within the scope of the appended claims and their equivalents.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US2005/022340 | 6/23/2005 | WO | 00 | 11/30/2007 |