Recent advances in cable and satellite distribution of subscription and “on-demand” audio, video and other digital content to subscribers have given rise to a growing number of digital set-top boxes (STBs) (sometimes referred to as Digital Consumer Terminals or “DCTs”) for decoding and delivering digitally broadcast programming. As the market for digital multimedia content of this type grows and matures, there is a corresponding growth of demand for new, more advanced features.
Video-on-demand (VOD) and audio-on-demand are examples of features made practical by broadband digital broadcasting via cable and satellite. Unlike earlier services where subscribers were granted access to scheduled encrypted broadcasts (e.g., movie channels, special events programming, pay per view purchases, etc.), these on-demand services permit a subscriber to request a desired video, audio or other program at any time and to begin viewing the content at any point therein. Upon receiving the request for programming (and, presumably, authorization to bill the subscriber's account), the service provider then transmits the requested program to the subscriber's set-top box for viewing/listening.
Systems for ensuring that, in a pay or subscription broadcast system, only those who have paid to receive broadcast content actually do receive the broadcast content are known in the art. Such a system is known as a conditional access system (“CA system” or “CAS”). Typically, pay broadcast systems generally broadcast encrypted material and utilize a CAS to deliver one or more appropriate decryption keys to authorized receivers only.
One area of concern, especially for direct content providers and movie companies, is secure delivery of content to an STB. Content delivery often occurs over data backbones, satellite networks, cable networks, and the Internet. The method by which content is produced and delivered to consumers is constantly changing. There is a constant risk of hackers being able to hack into a content delivery system and obtain digitally perfect copies of the content.
An exemplary content delivery system for delivering pre-encrypted content to a first subscriber terminal includes an off line encryption system configured to generate the pre-encrypted content using a control word, a caching system configured to store the pre-encrypted content and transmit the pre-encrypted content to the first subscriber terminal, a first conditional access system configured to allow a number of subscriber terminals to decrypt the pre-encrypted content, a second conditional access system configured to allow the first subscriber terminal to decrypt the pre-encrypted content, and a first encryption renewal system associated with the first conditional access system. The first encryption renewal system is configured to authorize the second conditional access system to allow the first subscriber terminal to decrypt the pre-encrypted content.
exemplary method for delivering pre-encrypted content to a first subscriber terminal includes generating the pre-encrypted content using a control word, transmitting the pre-encrypted content to the first subscriber terminal, and using an encryption renewal system associated with a first conditional access system to authorize a second conditional access system to allow the first subscriber terminal to decrypt the pre-encrypted content.
The accompanying drawings illustrate various embodiments of the present invention and are a part of the specification. The illustrated embodiments are merely examples of the present invention and do not limit the scope of the invention.
Throughout the drawings, identical reference numbers designate similar, but not necessarily identical, elements.
Systems and methods for delivering pre-encrypted content to one or more subscriber terminals whose access to the pre-encrypted content is controlled by two or more conditional access (CA) systems are described herein. An off line encryption system generates the pre-encrypted content using a control word. A caching server stores the pre-encrypted content and transmits the pre-encrypted content to the STB. An encryption renewal system associated with a first conditional access system authorizes a second conditional access system to allow one or more subscriber terminals to decrypt the pre-encrypted content.
In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present system and method. It will be apparent, however, to one skilled in the art that the present system and method may be practiced without these specific details. Reference in the specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. The appearance of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
The term “content” will be used herein and in the appended claims, unless otherwise specifically denoted, to refer to any digital information that may be delivered to a subscriber terminal such as a set-top box (STB), personal computer, mobile phone, or the like. The content may include, but is not limited to, video on demand (VOD), audio on demand, and other digital multimedia content. The content may be delivered via any suitable data network including, but not limited to, a satellite network, a cable network, a cellular wireless network, or the Internet. The terms “subscriber terminal” and “set-top box” will be used herein and in the appended claims, unless otherwise specifically denoted, to refer to any electronic component configured to receive content.
As mentioned, there is a need for secure delivery of content to legitimate subscribers or customers. A system operator generally encrypts content that is sent over a network to an STB. A content provider often encrypts content in real time as the content is transmitted to the customer. However, in some instances, real time encryption is not desirable or feasible. Hence, in some embodiments, a content provider encrypts the content before the content is transmitted to the STB. The encryption of content before the content is transmitted is called off-line encryption or pre-encryption. Pre-encryption often reduces cost and overhead associated with real time encryption.
In operation, the content generation system (100) generates clear content and inputs the clear content into the OLES (101). Clear content is content, such as a movie that is unencrypted. The OLES (101) encrypts the clear content using an encryption scheme that may or may be not known in the art. Encryption is the transformation of content using one or more keys into a form that is apparently unintelligible and extremely difficult, if not impossible, to access or decrypt without the key. A key may be a sequence of random or pseudorandom bits, for example. The use of keys to encrypt and decrypt content is known in the art. A key is also known as a control word. The OLES (101) pre-encrypts the content using one or more control words. However, for illustrative purposes, it will be assumed that the OLES (101) pre-encrypts the content using a single control word in the examples given herein. Hence, any reference to a “control word” means one or more control words.
OLES (101) also generates an encryption record (ER) associated with the pre-encrypted content. The ER is a data structure comprising the control word used to pre-encrypt the content. The ER may alternatively include information that allows the ERS (131), CAS (121), or other system to generate the control word used to pre-encrypt the content.
Once the clear content is pre-encrypted by the OLES (101), the resulting pre-encrypted content and associated ER are delivered to the VOD system (102) for storage. The VOD system (102) is configured to keep the pre-encrypted content and associated ER together. The VOD system (102) may be any system or server configured to store and distribute pre-encrypted VOD content and/or any other type pre-encrypted content to one or more STBs (103). The VOD system (102) is also referred to as a “VOD server,” a “caching system,” or a “caching server.”
Before the pre-encrypted content may be requested or viewed by subscribers, the VOD system (102) submits a request for an entitlement control message (ECM) to the ERS (131). The request includes the ER corresponding to the desired pre-encrypted content. The ECM is an encrypted form of the control word used to pre-encrypt the content and is CAS-specific. In other words, the ECM is generated in a way such that only STBs (103) controlled by the authorized CAS (121) may decrypt the ECM and obtain the control word needed to decrypt the pre-encrypted content. The ECM is cryptographically protected using a key (typically periodical) provided by the CAS (121). It will be recognized that the ECM may be referred to by a different name may be generated using any encryption scheme.
The ERS (131) responds to the ECM request by transmitting the ECM to the VOD system (102). Upon receiving a content request from the STB (103), the VOD system (102) transmits the pre-encrypted content and the corresponding ECM to the STB (103). In some embodiments, the ECM returned to the VOD system (102) by the ERS (131) is valid and useable with the pre-encrypted content only for a limited time as determined by the CAS (121).
As mentioned, the CAS (121) is included in the content delivery system (110) to prevent unauthorized STBs from receiving and/or decrypting the pre-encrypted content. In operation, the CAS (121) is configured to generate and send a subscriber authorization message to the STB (103) if the STB (103) is authorized to receive and decrypt the pre-encrypted content. The subscriber authorization message will be referred to herein as an entitlement management message (EMM) for explanatory purposes. The EMM is specific to a particular subscriber or STB (103) and includes information authorizing the STB (103) to decode or decrypt the ECM, thereby giving the STB (103) access to the control word needed to decrypt the pre-encrypted content. Without the EMM, the STB (103) cannot decrypt the pre-encrypted content. In this manner, the CAS (121) may control the access of individual STBs (103) to the pre-encrypted content.
In some instances, the content delivery system (110) may include more than one CAS (121). Each CAS (121) may belong to a different vendor or entity, for example, and may have a number of corresponding subscribers for which each CAS (121) controls access to pre-encrypted content. In some embodiments, each CAS (121) is configured to control its respective subscribers' access to pre-encrypted content provided by a single content generation system (100) and pre-encrypted by a single OLES (101). Furthermore, each CAS (121) may control access to the pre-encrypted content in a distinct manner. In other words, each CAS (121) may generate and manage the keys used in encryption and decryption in a distinct manner. In some embodiments, each CAS (121) uses a common encryption scheme such as DVS042.
The VOD system (102) includes a first storage unit (135) configured to store the ER and a second storage unit (136) configured to store the pre-encrypted content (136). As will be described in more detail below, the VOD system (102) also includes third and fourth storage units (137, 138) configured to store a number of ECMs and encrypted control words (ECWs). The ECWs will be described in more detail below. The storage units (1335-138) may be any combination of volatile and non-volatile memory such as a hard drive and random access memory (RAM).
In some embodiments, the content delivery system (130) includes an encryption renewal system (ERS) (131). As will be explained in more detail below, the ERS (131) is a trusted authority configured to control which of the CA systems (121) may participate in the content delivery system (130). The STBs (103) associated with a CAS (121) authorized to participate in the content delivery system (130) may successfully receive and decrypt the pre-encrypted content. On the other hand, the STBs (103) associated with a CAS (121) that is not authorized to participate in the content delivery system (130) will not be able to receive and/or decrypt the pre-encrypted content.
As shown in
In addition, the ERS (131) is configured to generate one or more ECWs with an encrypted control word generator (ECWG) (139). An ECW is an encrypted version of the control word used to pre-encrypt the clear content. In some embodiments, the ERS (131) generates an ECW corresponding to each CAS (121) that participates in the content delivery system (130). Alternatively, the ERS (131) may generate a single ECW that is used by each CAS (121) that participates in the content delivery system (130). The ECW is also referred to as a covered control word.
As shown in
As mentioned, the ERS (131) is configured to control which of the CA systems (121) may participate in the content delivery system (130). In some embodiments, the ERS (131) may be programmed or configured to authorize only certain CA systems (121) to participate in the content delivery system (130). Each CAS (121) shown in
In some embodiments, the CAS (121) has to be periodically reauthenticated with the ERS (131) via the CAS authorization protocol. If a CAS (121) becomes compromised or otherwise becomes unauthorized to distribute the pre-encrypted content, the ERS (131) is configured to cause the VOD system (102) to cease sending the ECW to the CAS (121). In this manner, the ERS (131) controls which of the CA systems (1210 may participate in the content delivery system (130).
As mentioned, the ECM is an encrypted form of the control word used to pre-encrypt the content. The term “ECM” will be used herein and in the appended claims, unless otherwise specifically denoted, to refer to any encrypted version of the control word used to pre-encrypt the content that is generated by a CAS (121). As shown in
In some embodiments, the CA systems (121) periodically regenerate the ECMs. These regenerated ECMs are transmitted to the VOD system (102) to replace the previously generated ECMs in the storage unit (137). In some alternative embodiments, the CA systems (121) are not configured to periodically regenerate the ECMs. In these alternative embodiments, each time a particular STB (103) makes a request for pre-encrypted content from the VOD system (102), the corresponding CAS (121) generates the ECM in real time based on an ECW provided by the VOD system (102). The CAS (121) then transmits the ECM to the VOD system (102). The exchange of information between the VOD system (102) and the CAS (121) that facilitates the real time generation of the ECM may be based on a digital video broadcasting (DBV) SimulCrypt protocol or any other key sharing protocol. SimulCrypt is a known protocol used in the art to share keys and other secret information between encryption systems.
Each CAS (121) also includes an EMM generator (141) configured to generate an EMM corresponding to an authorization from the CAS (121). The EMM includes information authorizing the STB (103) to decode or decrypt the corresponding ECM, thereby giving the STB (103) access to the control word needed to decrypt the pre-encrypted content. Without the EMM, the STBs (103) cannot decrypt the pre-encrypted content. In this manner, each CAS (121) may control the access of individual STBs (103) to the pre-encrypted content.
In some embodiments, any of the CA systems (121) may control the access of a particular STB (103) to the pre-encrypted content. For example, CAS1 (121-1) and CAS2 (121-2) may control the access of STB1 (103-1) to the pre-encrypted content. In some alternative embodiments, the access of a particular STB (103) to the pre-encrypted content is controlled by a single CAS (121). For example, the access of STB1 (103-1) to the pre-encrypted content may only be controlled by CAS1 (121-1). In this instance, other CA systems (121) (e.g., CAS2 (121-2)) cannot control the access of STB1 (103-1) to the pre-encrypted content.
An STB (103) may send a request for pre-encrypted content to the VOD system (102) via an interactive network (133). The interactive network (133) may be the Internet or any other type of network. A billing system (132) may bill an account corresponding to the requesting STB (103) and generate a subscriber authorization message that is transmitted to the CAS (121) corresponding to the requesting STB (103). The CAS (121) may then give access to the requesting STB (103) by transmitting the corresponding EMM to the requesting STB (103) and by causing the VOD system (102) to transmit the requested pre-encrypted content and the corresponding ECM to the requesting STB (103). The STB (103) then decrypts the ECM using the authorization provided in the EMM. Finally, the STB (103) decrypts the pre-encrypted content using the decrypted control word.
For example, the ERS (131) may authorize CAS1 (121-1) to participate in the content delivery system (130). The ERS (131) generates and transmits an encrypted control word (ECW1) to the VOD system (102). The VOD system (102) stores ECWI in the storage unit (138). The VOD system (102) then sends ECWI to CAS1 (121-1) which decrypts ECWI and generates an entitlement control message (ECMI) based on the decrypted control word. In some embodiments, CAS1 (121-1) is the only CAS (121) configured to be able to decrypt ECW1. The entitlement control message ECM, is then transmitted to the VOD system (102) and stored in the storage unit (137).
Any STB (103) associated with CAS1 (121-1) may then request pre-encrypted content from the VOD system (102). For example, STB1 (103-1) may request pre-encrypted content from the VOD system (102). If CAS1 (121-1) authorizes STB1 (103-1) to receive the requested pre-encrypted content, CAS1 (121-1) transmits EMM1 to STB1 (103-1). The VOD system (102) also transmits the pre-encrypted content and ECM1 to STB1 (103-1). STB1 (103-1) then decrypts ECM1 using EMM1 to acquire the control word used to pre-encrypt the content. The pre-encrypted content may then be decrypted by STB1 (103-1) using the decrypted control word.
As shown in
As shown in
Once the ECMs have been generated by the ECMGs (140), the ERS (131) transmits the ECMs corresponding to authorized CA systems (121) to the VOD system (102) to be stored in the storage unit (137). Each authorized CA system (121) also generates EMMs corresponding to the ECMs stored in the VOD system (102). The pre-encrypted content, ECMs, and EMMs may then be distributed to one or more STBs (103) as described in connection with
In some embodiments, the first ERS (131-1) transmits the ER generated by the OLES (101) to the second ERS (131-2) so that the second content delivery system (151) may use its own localized conditional access systems to secure access to the pre-encrypted content. As shown in
shown in
The preceding description has been presented only to illustrate and describe embodiments of invention. It is not intended to be exhaustive or to limit the invention to any precise form disclosed. Many modifications and variations are possible in light of the above teaching. It is intended that the scope of the invention be defined by the following claims.
Number | Date | Country | |
---|---|---|---|
60520695 | Nov 2003 | US |