The present invention relates generally to the field of encrypted streams in a communications system, and more specifically towards utilizing program map tables for transmitting and identifying dual encrypted streams in a communications system.
The control of the content is important in order to protect the programming from, for example, nonpaying customers. A conventional communications system, such as a cable television system, therefore, typically applies an encryption scheme to television content in order to prevent unrestricted access. Once a system operator chooses an encryption scheme, the operator installs all of the necessary headend equipment (e.g., Scientific-Atlanta's conditional access software and associated equipment). The receiving devices (e.g., set-tops) located at the subscriber's premises must be compatible with the encryption scheme in order to decrypt the content for viewing. Due to the proprietary encryption systems, however, an operator is prevented from installing different set-tops that do not have the proper decryption keys. If the operator wishes to install different set-tops that decrypt a different conditional access system, the operator would also have to install a second proprietary encryption system to overlay the incumbent encryption system in order to use both set-tops.
It would be to the operator's advantage to be able to select set-tops from any manufacturer and easily implement different encryption/decryption schemes in the system without duplicating the headend equipment and utilizing extra bandwidth. The present application is directed towards a conditional access system that enables different proprietary set-tops to decrypt content using different decryption keys.
The present invention will be described more fully hereinafter with reference to the accompanying drawings in which like numerals represent like elements throughout the several figures, and in which an exemplary embodiment of the invention is shown. This invention may, however, be embodied in many different forms and should not be construed as being limited to the embodiments set forth herein; rather, the embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. The present invention is described more fully hereinbelow.
The present invention is suitable for use in a partial dual encrypted system. The present invention allows for two different decryption devices (e.g., an incumbent, or first, set-top and an overlay, or second, set-top) to be located in a single system having an incumbent encryption scheme and a second encryption scheme. Each set-top is designed to decrypt the first or second proprietary encryption schemes, respectively. In accordance with the present invention, the second set-top utilizes a novel program map table to ensure that the second set-top chooses correct elementary streams in the partial dual-encrypted stream (i.e., a combined stream including a first encrypted stream, a second encrypted stream, and a clear stream) for a desired program.
More specifically, a clear multiprogram transport stream (MPTS) is provided to a headend facility. It will be appreciated that the clear MPTS includes several streams of unencrypted programs each including video, audio, and data packets. The packets each have a packet identifier (PID). Typically, an encryption scheme encrypts some or all of the packets (herein referred to as critical packets) of some or all of the programs depending upon the level of desired security. Further information regarding a conditional access system can be found in U.S. patent application Ser. No. 10/602,986 entitled “Method for Partially Encrypting Program Data” filed Jun. 25, 2003 and U.S. Pat. No. 6,424,717 entitled “Conditional Access System” filed Dec. 16, 1999, which are commonly assigned, the disclosure and teachings of which are hereby incorporated by reference.
Referring again to
There are, however, several disadvantages with the teachings of Unger. More specifically, Unger relies on controlling the incumbent headend encryption equipment to the level of specifying exactly which PIDs to encrypt, which would be extremely difficult to accomplish in some existing encryption systems. For example, a Scientific-Atlanta encryption system, as described in U.S. Pat. No. 6,424,717, does not provide a control interface to encrypt a specific PID. The encryption schemes are performed at the program level and would require extensive recreations of a program mapping table and its associated sessions. In contrast, the present invention does not require any changes to the incumbent headend equipment or require any special control. More specifically, the present invention simply utilizes the output of the existing headend equipment without modifications. Another disadvantage, is that the teachings of Unger require two operations on the clear stream by the overlayed headend equipment; specifically, a first time for the critical packet selection and again for the PID remapping. The present invention, however, only processes the streams once using one piece of equipment. Advantageously, this is an improvement that reduces the cost and the complexity of the system.
A further advantage of the present invention is that modification of the encryption percentage is accomplished as a function of available bandwidth in the system. For example, if there is additional bandwidth available, the present invention can increase the encrypted percentage from, for example, 2% to 6%. Notably, this feature is important to the system operators who need to be sensitive of both the required bandwidth and the security level of the programs.
Referring now to
Referring again to
In the aligned state 928, state 930 waits until buffers A 505, B 510, and C 515 have greater than one packet. Subsequently, the head packets are verified to have the same PID value, in state 935. If not, in state 940, the packet in stream C passes and packets in streams A and B drop, and state 935 continues verifying the packets. At times, packets in a program can be swapped in their position and are essentially out of order. In that case, passing the packets in the clear stream C ensure that the packets are passed rather than stalling in the buffers. If the head packet PID values are the same, the values of the continuity_counter field of the packets are then verified to be the same, in state 945. If not, the assumption is that there is an error in the alignment, and the comparator 520 returns to the initial state 905. It will be appreciated that the continuity counter of the clear stream C is used as the reference number. If the continuity counters are the same for the all the packets in the streams, state 950 releases the packets from the buffers A, B, and C, and returns to the aligned state 930 to continue ensuring alignment of the packets. It will be appreciated that there are other methods for verifying alignment, other than the use of the continuity_count value, such as the presence and length of an adaptation_field, or the presence and value of a program_clock_reference (PCR) value.
It should be noted that MPEG packet processing equipment typically modifies the Program Clock Reference (PCR) of programs being processed, to correct for any PCR jitter that would otherwise be introduced. In this embodiment, the PCRs of clear stream C are regarded as the primary PCRs, and all PCR modifications are performed on the values in stream C. If the PCR-bearing packet is also a critical packet, the corrected PCR value from stream C is placed into the PCR field in the packet from streams A and B.
Referring again to
A selector 530 also receives the released packet of clear stream C, which it uses as a reference stream to control the switches 535, 540, 545. In the preferred embodiment of the present invention, the selector 530 allows the packets of the clear stream C to pass through to a multiplexer 550 until such time as a critical packet is detected. Again, it will be appreciated that the critical packet can be a video, audio, and/or data packet. When the critical packet is detected, the switch 545 opens and switches 535, 540 are closed, thereby allowing the released packets of encrypted streams A and B, which each have the aligned critical packet, to simultaneously pass through to the multiplexer 550. The multiplexer 550 then combines the packets to provide a partial dual-encrypted transport stream where the dual encryption includes packets encrypted by both scrambler A 410 and scrambler B 415. The multiplexed stream is then provided to multiplexer 440 (
A partial dual-encrypted transport stream is then provided to the multiplexer 640 (
By way of example and in accordance with the present invention, the PAT 1005 includes incumbent program numbers 1015 (i.e., 0x1, 0x2, 0x3), which point to programs that have been encrypted with the incumbent encryption scheme. Additionally, the PAT 1005 also provides second program numbers 1018 (i.e., 0x8001, 0x8002, 0x8003), which point to programs that have been encrypted with the second encryption scheme. Accordingly, the incumbent, or first, set-tops are designed to search for and receive the intended program numbers (i.e., 0x1, 0x2, 0x3) using their associated PMT, and the second set-tops are designed to search for and receive the second program numbers (i.e., 0x8001, 0x8002, 0x8003) using their associated PMT. In this manner, the incumbent set-tops work properly under any condition regardless of any manipulations that may be made to the transport stream. As previously mentioned, the present invention does not require any recreations of a program mapping table related to any incumbent set-tops in the system.
The second encrypted programs 1018, which are intended for the second set-tops, each have a different program map table (PMT) in accordance with the present invention, and one PMT 1010 is shown as an example. It will be appreciated that the PMTs 1012 for the incumbent encrypted programs 1015 remain unchanged having the original PID numbers to ensure that incumbent set-tops can properly decrypt their encrypted programs. The PMTs for the second encryption program numbers 1018 include the incumbent PMT 1020 plus additional overlay information 1025, 1030 for each PID number (e.g., 0x1010). In this manner, the second set-tops are directed to receive any of the desired packets that were sent in the clear having an incumbent PID value 1020 and also the second encrypted packets having an overlay PID 1030. It will be appreciated that all of the encrypted packets having the incumbent PID values 1020 are disregarded. In other words, the second encrypted PID values 1030 and the clear packets included in the first encrypted PID 1020 are necessary for the second set-top to properly decrypt and display the service. Additionally, in the PMT 1010 a conditional access descriptor 1025 signifies whether or not a conditional access overlay encryption scheme is used for the program.
It will be appreciated that modifications can be made to the embodiment of the present invention that is still within the scope of the invention. Additionally, the present invention can be implemented using hardware and/or software that are within the scope of one skilled in the art. The embodiments of the description have been presented for clarification purposes; however, the invention is defined by the following claims.
The present application is a continuation of application Ser. No. 10/719,161 entitled A Partial Dual-Encrypted Stream Utilizing Program Map Tables filed Nov. 21, 2003 now abandoned. The present application is also a continuation-in-part of application Ser. No. 10/629,839 entitled “Methods and Apparatus for Providing a Partial Dual-Encrypted Stream in a Conditional Access Overlay System” filed Jul. 30, 2003, now U.S. Pat. No. 7,224,798 which is a continuation-in-part of application Ser. No. 10/602,986 entitled “Method for Partially Encrypting Program Data” filed Jun. 25, 2003, which was filed simultaneously with applications having Ser. Nos. 10/602,988 and 10/602,987, which were a continuation of application Ser. No. 09/930,901 filed Aug. 16, 2001, now U.S. Pat. No. 6,937,729 which is a continuation of application Ser. No. 09/487,076, filed Jan. 19, 2000, now U.S. Pat. No. 6,292,568, which is a continuation of application Ser. No. 09/126,783, filed Jul. 31, 1998, presently abandoned, which claims the benefit of U.S. provision application No. 60/054,575, filed Aug. 1, 1997; and is a CIP of application Ser. No. 09/111,958, filed Jul. 8, 1998, now abandoned, which claims the benefit of U.S. provision application No. 60/054,578, filed Aug. 1, 1997; and is CIP of application Ser. No. 08/767,535, filed Dec. 16, 1996, now U.S. Pat. No. 6,005,938; and is a CIP of application Ser. No. 08/580,759 filed Dec. 29, 1995, now U.S. Pat. No. 5,870,474, which claims the benefit of U.S. provisional application No. 60/007,962, filed Dec. 4, 1995; and is CIP of application Ser. No. 08/415,617, filed Apr. 3, 1995, now U.S. Pat. No. 5,742,677. The present application descends from an application, which was one of seven original applications with identical Detailed Descriptions. All of these applications have the same filing date and the same assignee. The serial numbers and filing dates of the six applications follow: Ser. No. 09/127,352, filed Jul. 31, 1998, presently abandoned, for which a continuation Ser. No. 09/488,230 was filed on Jan. 20, 2000, which issued as U.S. Pat. No. 6,252,964, and continuation Ser. No. 09/811,085 was filed on Mar. 16, 2001, which issued as U.S. Pat. No. 6,516,412, and continuation Ser. No. 10/287,913 was filed on Nov. 5, 2002, currently pending; Ser. No. 09/126,921, filed Jul. 31, 1998, which issued as U.S. Pat. No. 6,157,719, for which a continuation Ser. No. 09/135,615 was filed on Aug. 18, 1998, which issued as U.S. Pat. No. 6,424,714; Ser. No. 09/127,273, filed Jul. 31, 1998, presently abandoned, for which a continuation Ser. No. 09/493,409 was filed on Jan. 28, 2000, which issued as U.S. Pat. No. 6,560,340, and for which continuation Ser. No. 10/377,416 was filed on Mar. 3, 2003, which is currently pending; Ser. No. 09/127,152, filed Jul. 31, 1998, presently abandoned, for which a continuation Ser. No. 09/488,104 was filed on Jan. 20, 2000, which issued as U.S. Pat. No. 6,246,767; for which continuation Ser. No. 09/748,313 was filed on Dec. 26, 2000, which issued as U.S. Pat. No. 6,526,508; and for which continuation Ser. No. 09/881,428 was filed on Jun. 14, 2001, currently pending; Ser. No. 09/126,888, filed Jul. 31, 1998, presently abandoned, for which a continuation Ser. No. 09/464,794 was filed on Dec. 16, 1999, which issued as U.S. Pat. No. 6,424,717; and Ser. No. 09/126,795, filed Jul. 31, 1998, which issued as U.S. Pat. No. 6,105,134.
Number | Name | Date | Kind |
---|---|---|---|
4155042 | Permut et al. | May 1979 | A |
4358672 | Hyatt et al. | Nov 1982 | A |
4388643 | Aminetzah | Jun 1983 | A |
4405829 | Rivest et al. | Sep 1983 | A |
4531020 | Wechselberger et al. | Jul 1985 | A |
4600921 | Thomas et al. | Jul 1986 | A |
4613901 | Gilhousen et al. | Sep 1986 | A |
4634807 | Chorley et al. | Jan 1987 | A |
4649533 | Chorley et al. | Mar 1987 | A |
4658093 | Hellman | Apr 1987 | A |
4712238 | Gilhousen et al. | Dec 1987 | A |
4712239 | Frezza | Dec 1987 | A |
4736422 | Mason | Apr 1988 | A |
4823385 | Hegendorfer | Apr 1989 | A |
4864615 | Bennett et al. | Sep 1989 | A |
4866770 | Seth-Smith et al. | Sep 1989 | A |
4885777 | Takaragi et al. | Dec 1989 | A |
4887296 | Horne | Dec 1989 | A |
RE33189 | Lee et al. | Mar 1990 | E |
4912762 | Lee et al. | Mar 1990 | A |
4982430 | Frezza et al. | Jan 1991 | A |
4993068 | Piosenka et al. | Feb 1991 | A |
5003591 | Kauffman | Mar 1991 | A |
5018196 | Takaragi et al. | May 1991 | A |
5029207 | Gammie | Jul 1991 | A |
5036537 | Jeffers et al. | Jul 1991 | A |
5073935 | Pastor | Dec 1991 | A |
RE33808 | Wright, Jr. | Jan 1992 | E |
5124117 | Tatebayashi et al. | Jun 1992 | A |
5142578 | Matyas et al. | Aug 1992 | A |
5151782 | Ferraro | Sep 1992 | A |
5155591 | Wachob | Oct 1992 | A |
5175765 | Perlman | Dec 1992 | A |
5231665 | Auld et al. | Jul 1993 | A |
5235643 | Anderson et al. | Aug 1993 | A |
5237610 | Gammie et al. | Aug 1993 | A |
5243652 | Teare et al. | Sep 1993 | A |
5249230 | Mihm, Jr. | Sep 1993 | A |
5270822 | Choi | Dec 1993 | A |
5282248 | DeJoy | Jan 1994 | A |
5282249 | Cohen et al. | Jan 1994 | A |
5285497 | Thatcher, Jr. | Feb 1994 | A |
5301233 | Wasilewski et al. | Apr 1994 | A |
5343527 | Moore | Aug 1994 | A |
5381477 | Beyers, II et al. | Jan 1995 | A |
5381481 | Gammie et al. | Jan 1995 | A |
5400401 | Wasilewski et al. | Mar 1995 | A |
5402490 | Mihm, Jr. | Mar 1995 | A |
5414773 | Handelman | May 1995 | A |
5418782 | Wasilewski | May 1995 | A |
5420866 | Wasilewski | May 1995 | A |
5425101 | Woo et al. | Jun 1995 | A |
5432542 | Thibadeau et al. | Jul 1995 | A |
5440633 | Augustine et al. | Aug 1995 | A |
5465299 | Matsumoto et al. | Nov 1995 | A |
5473692 | Davis | Dec 1995 | A |
5481542 | Logston et al. | Jan 1996 | A |
5481613 | Ford et al. | Jan 1996 | A |
5488410 | Lieberfarb et al. | Jan 1996 | A |
5497422 | Tysen et al. | Mar 1996 | A |
5499294 | Friedman | Mar 1996 | A |
5499295 | Cooper | Mar 1996 | A |
5506904 | Sheldrick et al. | Apr 1996 | A |
5509073 | Monnin et al. | Apr 1996 | A |
5519780 | Woo et al. | May 1996 | A |
5524052 | Augustine et al. | Jun 1996 | A |
5550984 | Gelb | Aug 1996 | A |
5557678 | Ganesan | Sep 1996 | A |
5557765 | Lipner et al. | Sep 1996 | A |
5559889 | Easter et al. | Sep 1996 | A |
5563950 | Easter et al. | Oct 1996 | A |
5565909 | Thibadeau et al. | Oct 1996 | A |
5568552 | Davis | Oct 1996 | A |
5568554 | Eastlake, III | Oct 1996 | A |
5583939 | Chang et al. | Dec 1996 | A |
5588058 | Le Berre | Dec 1996 | A |
5590202 | Bestler et al. | Dec 1996 | A |
5621793 | Bednarek et al. | Apr 1997 | A |
5671276 | Eyer et al. | Sep 1997 | A |
5675649 | Brennan et al. | Oct 1997 | A |
5740246 | Saito | Apr 1998 | A |
5742677 | Pinder et al. | Apr 1998 | A |
5764770 | Pinder et al. | Jun 1998 | A |
5787172 | Arnold | Jul 1998 | A |
5857020 | Peterson, Jr. | Jan 1999 | A |
5862220 | Perlman | Jan 1999 | A |
5870474 | Wasilewski et al. | Feb 1999 | A |
5920626 | Durden et al. | Jul 1999 | A |
6005938 | Banker et al. | Dec 1999 | A |
6009116 | Bednarek et al. | Dec 1999 | A |
6105134 | Pinder et al. | Aug 2000 | A |
6108365 | Rubin et al. | Aug 2000 | A |
6246767 | Akins, III et al. | Jun 2001 | B1 |
7092616 | Unger | Aug 2006 | B2 |
7124303 | Candelore | Oct 2006 | B2 |
7127619 | Unger et al. | Oct 2006 | B2 |
7139398 | Candelore et al. | Nov 2006 | B2 |
7151831 | Candelore et al. | Dec 2006 | B2 |
7336787 | Unger et al. | Feb 2008 | B2 |
20020188567 | Candelore | Dec 2002 | A1 |
20020194613 | Unger | Dec 2002 | A1 |
20030026423 | Unger et al. | Feb 2003 | A1 |
20040003008 | Wasilewski et al. | Jan 2004 | A1 |
20040107350 | Wasilewski et al. | Jun 2004 | A1 |
20040139337 | Pinder et al. | Jul 2004 | A1 |
20050152548 | Wasilewski | Jul 2005 | A1 |
20050259813 | Wasilewski et al. | Nov 2005 | A1 |
Number | Date | Country |
---|---|---|
0 723 371 | Jul 1996 | EP |
0 752 786 | Jan 1997 | EP |
WO 9413107 | Jun 1994 | WO |
WO 9529560 | Nov 1995 | WO |
Number | Date | Country | |
---|---|---|---|
20060233369 A1 | Oct 2006 | US |
Number | Date | Country | |
---|---|---|---|
60054575 | Aug 1997 | US | |
60054578 | Aug 1997 | US | |
60007962 | Dec 1995 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10719161 | Nov 2003 | US |
Child | 11275051 | US | |
Parent | 09930901 | Aug 2001 | US |
Child | 10602986 | US | |
Parent | 09487076 | Jan 2000 | US |
Child | 09930901 | US | |
Parent | 09126783 | Jul 1998 | US |
Child | 09487076 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10629839 | Jul 2003 | US |
Child | 10719161 | US | |
Parent | 10602988 | Jun 2003 | US |
Child | 10629839 | US | |
Parent | 10602987 | Jun 2003 | US |
Child | 10602988 | US | |
Parent | 10602986 | Jun 2003 | US |
Child | 10602987 | US | |
Parent | 09111958 | Jul 1998 | US |
Child | 09126783 | US | |
Parent | 08767535 | Dec 1996 | US |
Child | 09111958 | US | |
Parent | 08580759 | Dec 1995 | US |
Child | 08767535 | US | |
Parent | 08415617 | Apr 1995 | US |
Child | 08580759 | US |