Upgrading of encryption

Information

  • Patent Grant
  • 7350082
  • Patent Number
    7,350,082
  • Date Filed
    Wednesday, November 13, 2002
    22 years ago
  • Date Issued
    Tuesday, March 25, 2008
    16 years ago
Abstract
A method of upgrading an encryption process for encryption of video information from an old encryption process to a new encryption process, consistent with certain embodiments involves selecting a portion of video content for selective encryption. The selected portion is duplicated to produce first and second copies of the selected portion. The first copy is encrypted using the old encryption process and the second copy is encrypted using the new encryption process to produce a dual partially encrypted segment of video information that can either be broadcast over a cable or satellite system or stored in a package medium as two program chains.
Description
COPYRIGHT NOTICE

A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.


FIELD OF THE INVENTION

This invention relates generally to the field of digital video and encryption thereof. More particularly, this invention relates to an encryption method and apparatus particularly useful for encrypting packetized video content such as that provided by cable and satellite television systems.


BACKGROUND OF THE INVENTION

The above-referenced commonly owned patent applications describe inventions relating to various aspects of methods generally referred to herein as partial encryption or selective encryption. More particularly, systems- are described therein wherein selected portions of a particular selection of digital content (e.g., a television program) are encrypted using two (or more) encryption techniques while other portions of the content are left unencrypted. By properly selecting the portions to be encrypted, the content can effectively be encrypted for use under multiple decryption systems without the necessity of encryption of the entire selection of portions to be encrypted, the content can effectively be encrypted for use under multiple decryption systems without the necessity of encryption of the entire selection of content. In some embodiments, only a few percent of data overhead is needed to effectively encrypt the content using multiple encryption systems. This results in a cable or satellite system being able to utilize Set-top boxes (STBs) or other implementations of conditional access (CA) receivers from multiple manufacturers in a single system—thus freeing the cable or satellite company to competitively shop for providers of Set-top boxes.





The features of the invention believed to be novel are set forth with particularity in the appended claims. The invention itself however, both as to organization and method of operation, together with objects and advantages thereof, may be best understood by reference to the following detailed description of the invention, which describes certain exemplary embodiments of the invention, taken in conjunction with the accompanying drawings in which:



FIG. 1 illustrates a chain of video object units as used in a Digital Versatile Disc (DVD).



FIG. 2 illustrates a dual partially encrypted DVD with a video chain using standard encryption consistent with certain embodiments of the present invention.



FIG. 3 illustrates a dual partially encrypted DVD with a video chain using a new encryption consistent with certain embodiments of the present invention.



FIG. 4 illustrates a partially encrypted DVD with a video chain using a new encryption consistent with certain embodiments of the present invention.



FIG. 5 illustrates a product transition cycle consistent with certain embodiments of the present invention.



FIG. 6 illustrates a product transition cycle consistent with certain embodiments of the present invention.



FIG. 7 illustrates a television Set-top box that decrypts and decodes in a manner consistent with certain embodiments of the present invention.



FIG. 8 is a flow chart depicting an encryption process consistent with certain embodiments of the present invention.





DETAILED DESCRIPTION OF THE INVENTION

While this invention is susceptible of embodiment in many different forms, there is shown in the drawings and will herein be described in detail specific embodiments, with the understanding that the present disclosure is to be considered as an example of the principles of the invention and not intended to limit the invention to the specific embodiments shown and described. In the description below, like reference numerals are used to describe the same, similar or corresponding parts in the several views of the drawings.


The terms “scramble” and “encrypt” and variations thereof are used synonymously herein. Also, the term “television program” and similar terms can be interpreted in the normal conversational sense, as well as a meaning wherein the term means any segment of AN content that can be displayed on a television set or similar monitor device. The term “video” is often used herein to embrace not only true visual information, but also in the conversational sense (e.g., “video tape recorder”) to embrace not only video signals but associated audio and data. The term “legacy” as used herein refers to existing technology used for existing package medium and broadcast, cable and satellite systems such as existing encryption technology used at the launch of such a system. The exemplary embodiments disclosed in the above applications and consistent with certain embodiments of the present invention are decoded by a television Set-Top Box (STB), but it is contemplated that such technology will soon be incorporated within television receivers of all types whether housed in a separate enclosure alone or in conjunction with recording and/or playback equipment or Conditional Access (CA) decryption module or within a television set itself. The present document generally uses the example of a “dual partial encryption” embodiment, but those skilled in the art will recognize that the present invention can be utilized to realize multiple partial encryption without departing from the invention. Partial encryption and selective encryption are used synonymously herein. The term “package medium” and similar terms as used herein are intended to embrace a recording medium such as a Digital Versatile Disc (DVD), Compact Disc (CD) or other magnetic, optical or other recorded medium that is generally merchandised as a package that contains the electronic storage medium and is sold as a retail commodity, as contrasted to an electronically downloadable data stream.


In order to provide content control and protection for both broadcast content (whether by satellite, cable, pay-per-view or otherwise) as well as for packaged media such as Digital Versatile Discs (DVDs), various types of encryption are often utilized. Either the entire content is encrypted under a given encryption system using a particular encryption technique, or the content is partially encrypted using a particular encryption technique.


Unfortunately, as computing power grows, a single encryption technique or a given encryption key may be rendered ineffective in thwarting those who would attempt to pirate the protected content. This problem has been recognized in the satellite and cable industry where it is common to make changes to encryption keys on a regular basis. For example, it is common for such systems to change keys on a monthly basis. Moreover, although less frequent, it is occasionally advisable to upgrade the encryption process itself. By way of example, DES (Data Encryption Standard) encryption can be upgraded from 40 bit encryption to 56 bit encryption to 128 bit encryption, etc. to enhance the security of the encryption. Unfortunately, even with these key sizes, with today's desktop computing power, it is feasible to hack an encryption key by brute force. In another example, DES encryption can be upgraded to a more sophisticated encryption algorithm such as Triple DES, Advanced Encryption Standard (AES) or Common Scrambling Algorithm (CSA). When this happens, upgrading of the software within a television STB or equivalent device may require a software download or even a change in hardware.


Similarly, encryption techniques used in packaged media may be subject to being cracked by hackers and thus the security of the content compromised. Such is the case for the encryption algorithm originally released with the introduction of DVDs, which has been cracked and the decryption technique posted on the Internet. While the problem is substantial in the case of a content distributor such as a cable system operator, in the case of package media such as DVDs, the problem may even more complex since any encryption used in the packaged medium should be compatible with playback equipment from any of dozens of vendors (whereas, the cable or satellite system may be a closed environment with only one or a small limited number of approved vendors). Thus, until a generational change in encryption standards for the package medium can be made, the content may be compromised. Moreover, the user's existing content may become obsolete by any radical change in encryption introduced to prevent piracy. This may make it extremely difficult for equipment manufacturers to phase out equipment in favor of new equipment, since such changes might be rejected by the consumer. Thus, a transitional mechanism would be beneficial in order to make a transition to a new encryption standard which preserves the current encryption standard for a while, yet facilitates transition to a new standard.


In the above-referenced patent applications, a technique called dual partial encryption or dual selective encryption is described. In this technique, selective portions of video and/or audio content are encrypted while other portions are transmitted unencrypted (clear). By appropriate selection of the content to be encrypted, a very high level of security of the content can be maintained at the sacrifice of minimal amounts of overhead. Since the amount of encrypted content is a small percentage of the overall program content, that small portion can be duplicated and encrypted under several encryption schemes. This makes it possible to decode the program on multiple decoders using multiple decryption schemes. The various encrypted portions in the above applications are distinguished by use of multiple program identifiers (PIDs). The present invention extends this concept to use in upgrading of encryption techniques for both broadcast content and packaged media.


First consider the example of packaged media, and in particular for purposes of this example (but without limitation) DVDs. DVDs are currently partially encrypted with up to 25% of the overall content being encrypted and up to 50% of any one sector being encrypted. However, the selected VOBU (video object units—a packet definition for packets of 2048 bytes used in DVDs) which are currently encrypted are not necessarily optimally selected. As the above-referenced patent applications have illustrated, by optimal selection of the content to be encrypted, a much lower percentage of packets can be encrypted to still effectively render the content well protected. The selection of content to be encrypted can be any of the selections identified in the above-referenced patent applications, such as, for example without limitation, packets containing a video slice header, packets containing a video slice header appearing in an active region of a video frame, any packet carrying data representing an active region of a video frame, I Frame packets, packets containing motion vectors in a first P frame following an I Frame, packets having an intra_slice_flag indicator set, packets having an intra_slice indicator set, packets containing an intra_coded macroblock, packets that carry data for a slice containing an intra_coded macroblock, packets containing data from a first macroblock following the video slice header,packets containing video slice headers, packets containing anchor data, and P Frame packets for progressively refreshed video data, packets occurring in a star pattern approximately situated at approximately a center of an image, packets carrying data representing a pattern of horizontal stripes across an image, packets carrying data representing a pattern of vertical stripes across an image, packets carrying information that is needed to decode the content, packets carrying a payload that comprises a packetized elementary stream (PES) header, samples of the video content taken at prescribed sampling intervals, packets containing a specified elementary stream, and any other suitable packet selection criterion.


Once a collection of VOBUs (packets) are selected for encryption, the content is dual partial encrypted so that it has a clear portion, a portion encrypted using the old encryption process and a portion encrypted using the new encryption process. The dual partial encrypted video content is then stored on the DVD so that a first program chain references the clear portion and the portion encrypted using the old encryption process, and so that a second program chain references the clear portion and the portion encrypted using the new encryption process. Such alternative program chains are currently used in some DVDs to provide additional program content such as director cuts, different viewing angles, alternate plots and endings, and to provide parental control and alternative audio tracks. The majority of DVDs currently in production have only a single linear program chain.


A dual partially encrypted DVD (or other package medium such as a CD) can thus be used as a transitional medium to facilitate conversion to the new encryption format. Consider, FIGS. 1-4 to understand the principles of the transition to a new encryption algorithm. FIG. 1 depicts a DVD which is partially encrypted using the current standard CSS (Content Scrambling System) encryption system. In this figure, a selection of content contains a sequence of VOBUs (packets) having clear VOBUs 20 and encrypted VOBUs 24. The chain of clear VOBUs 20 and encrypted VOBUs 24 together form a content selection that can be played back through a standard DVD player that understands and decrypts CSS encrypted VOBUs.



FIGS. 2 and 3 depict a dual partially encrypted DVD consistent with certain embodiments of the present invention. In these figures, the DVD contains the same chain of partially encrypted content made up of VOBUs 20 and 24 as shown in FIG. 1. Thus, a standard DVD player that decrypts CSS encrypted VOBUs can play back the DVD depicted in FIG. 2 by simply following the program chain shown. A new DVD player can be introduced that also can play back the DVD by following the program chain shown in FIG. 3. The new DVD player need not be able to decode CSS encryption as long as it can decode a new encryption scheme (shown as NEW).


In this arrangement of FIG. 3, the new DVD player utilizes a program chain defined at the time of the manufacture of the DVD that bypasses VOBUs 24 in favor of VOBUs 28 that utilize the new encryption system. Such new DVD players could be programmed to only recognize the program chain associated with the new encryption system, yet the same DVD could be backward compatible with CSS encryption as well as being compatible with the new system. The process used to distinguish between the two encryption systems is similar to that used for parental control or separate viewing angles available on some currently available DVDs.


As applied to DVDs certain embodiments of the present invention would select Video Object Unit packets which are important to the decoding of the rest of the content. The Units chosen for encryption would be duplicated and scrambled with CSS and a new improved algorithm. A new type of program chain called “security” can be created that only the new players will understand and respond to. These would be similar to how parental rating program chains are managed. Older players will simply take the program chain containing CSS scrambled packets. New players would take the security program chain with the new algorithm packets.


The use of CSS encrypted packets in one program chain assures that new DVDs work in old DVD players. The duplicated and non-CSS scrambled packets will not interfere with the old players. The duplicated packets using the new encryption algorithm can be encoded as alternate track or program chain (PGC).


Thus, new players can be “forced” to take the program chain with the new encryption algorithm automatically. Like camera angle branches, branches for encryption would be tightly interleaved together. These would likely use Interleaved Blocks (ILVB). So, in the case of the arrangements depicted in FIGS. 2-3, the branches used for multiple encryption as depicted herein, are preferably tightly interleaved and preferably use Interleaved Blocks.


Once the marketplace has matured somewhat and the new encryption system is standard, DVD manufacturers can begin phasing out dual encrypted DVDs as shown in FIGS. 2-3 in favor of the format depicted in FIG. 4. When the market is mature enough, the new DVDs will only be compatible with new DVD players and only the new encryption system is needed. Alternatively, the new DVDs can be dual partially encrypted with the next generation of encryption technology in the same manner as shown in FIGS. 2-3.


Therefore, in accordance with certain embodiments consistent with the present invention, multiple replacement encryption algorithms can be used to produce packaged media such as DVDs so that each DVD contains multiple partially encrypted content. This will allow new players to actually phase out support for the older encryption algorithms since the older DVDs would already have the new algorithm encoded into them (even prior to marketing new players).


Thus, as described, a method of providing an upgrade for encryption used to encrypt video content stored in a Digital Versatile Disc (DVD) from an old encryption process to a new encryption process, consistent with certain embodiments of the invention, involves selecting a portion of video content for dual partial encryption; dual partial encrypting the video content so that the video content has a clear portion, a portion encrypted using the old encryption process and a portion encrypted using the new encryption process; storing the dual partial encrypted video content on the DVD so that a first program chain references the clear portion and the portion encrypted using the old encryption process, and so that a second program chain references the clear portion and the portion encrypted using the new encryption process.


Similarly, a method of providing an upgrade for encryption used for encryption of video content stored in package medium from an old encryption process to a new encryption process, consistent with certain embodiments of the invention, involves selecting a portion of video content for selective encryption; duplicating the selected portion of content to produce first and second copies of the selected portion; encrypting the first copy of the selected portion using the old encryption process; encrypting the second copy of the selected portion using the new encryption process; storing the portion of the video content which is not selected as clear content on the package medium; storing the encrypted first copy and the encrypted second copy of the selected portion on the package medium.


Thus, the transition path to a newer and more secure encryption method is depicted in FIG. 5 where initially, at 40, manufacturers of DVDs and DVD players manufacture the players and media using the technique illustrated in FIG. 1 where only a single encryption process is used. During a transitional stage, the package media is dual partially encrypted to carry data encrypted by both the old encryption process and the new process at 44. Finally, at 48, the transition can be completed by phasing out the use of the original encryption process entirely. During the interim, at 44, players may be compatible with either encryption system or both and can still decode and play back the medium.


Consider now the application of dual partial encryption to the broadcast content industry. In the US cable and satellite markets, the Data Encryption Standard (DES) is primarily in use. DES is quickly becoming obsolete. The current standard version of DES as used by the cable and satellite industry generally uses a 56-bit key. With the rapidly increasing processing capabilities of PCs, decoding by a brute force trial of all possible keys with one or more computers, is rapidly becoming more feasible.


One of the most difficult things for a service provider to do is to upgrade the low level scrambling of a content delivery network. This is because of the installed base of decoders that perform decryption only based on the old encryption process and have no provision for upgrading the encryption. It is difficult for an operator to upgrade all the units in the field. This could potentially cost many millions of dollars. One possible solution is the use of Point of Deployment (POD) modules. When they are deployed, POD modules will provide one method of changing the low level scrambling used in a network. This is accomplished by wholesale replacement of all PODs in the network. However, even replacing POD modules can be costly, and this avenue is not available for decoders that do not support PODs. As of this date, PODs have only been deployed in limited numbers in the US cable market. Using current technology, new scrambling cannot be used until all the units or modules doing the old encryption are removed from the field. This is a logistical and financial problem as mentioned earlier. The invention allows new Set-top boxes and other decoding devices to be introduced without the need to make legacy STBs and other decoders obsolete. As an impetus to replace older units, the service operator may withhold new services to these devices, an thus compel the users to get new units (performing the new algorithm) to get the new services.


Accordingly, the progression for transition to a new encryption algorithm for cable and satellite operators (and similar content providers) is similar to that depicted in FIG. 5 and is illustrated more explicitly in FIG. 6. In this figure, the current encryption algorithm is depicted at 60 with a transitional phase at 64 being used to transition from an old encryption algorithm to a newer algorithm as new STBs or PODs are introduced. When a large installed base of newer STBs is achieved, the new encryption algorithm may be used exclusively at 68.


Thus, in accordance with certain embodiments of the present invention, a method of upgrading an encryption process for encryption of video information from an old encryption process to a new encryption process involves selecting a portion of video content for selective encryption; duplicating the selected portion of content to produce first and second copies of the selected portion; encrypting the first copy of the selected portion using the old encryption process; and encrypting the second copy of the selected portion using the new encryption process.


In order to achieve the desired dual partial encryption according to the present invention for making a transition between two encryption algorithms, a newly deployed decoder (e.g., a STB) is provided with a mechanism to distinguish the encrypted portions of the program material. This is accomplished in the manner described in the above-referenced patent applications. In one preferred method, the dual encrypted packets are distinguished by use of separate Program Identifiers (PIDs). That is, clear packets are identified by a first packet identifier. Dual encrypted packets are identified by a pair of PIDs that distinguish the new encryption system from the old. For example, PID 101 can be associated with clear packets as well as packets encrypted under the old encryption system. PID 102 can be used to identify packets encrypted under the new encryption system and is referred to as a secondary PID or shadow PID. The new STB is provided with the PIDs associated with the program and then decodes the program by ignoring encrypted packets with PID 101 in favor of encrypted packets with PID 102. This process is described in detail in the above-referenced patent applications.


In accordance with certain embodiments consistent with the present invention, a selectively encrypted digital video signal can be embodied in a carrier wave, that has a stream of packets of video data, wherein the stream of packets when not encrypted represent a segment of video content; certain of the packets being unencrypted and certain of the packets being encrypted under a legacy encryption method and certain of the packets being encrypted under a replacement encryption method; a first segment of code that identifies the unencrypted packets by a first packet identifier (PID); and a second segment of code that identifies the encrypted packets by a second packet identifier (PID).


An authorized Set-top box such as 100 illustrated in FIG. 7 operating under the new encryption system decrypts and decodes the incoming program by recognizing both primary and secondary PIDs associated with a single program. The multiplexed video data stream containing both PIDs is directed to a demultiplexer 104. When a program is received that contains encrypted content that was encrypted by any of the selective encryption techniques described in the above-referenced patent applications, the demultiplexer directs encrypted packets containing content encrypted under the new encryption algorithm and secondary PIDS to a decrypter 108 that decrypts the packets encrypted under the new encryption system. After these packets are decrypted at 108, they are passed to a PID remapper 112. As illustrated, the PID remapper 112 receives packets that are unencrypted and bear the primary PID as well as the decrypted packets having the secondary PID. The PID remapper 112 combines the decrypted packets from decrypter 108 with the unencrypted packets having the primary PID to produce an unencrypted data stream representing the desired program. PID remapping is used to change either the primary or secondary PID or both to a single PID. This unencrypted data stream can then be decoded normally by decoder 116. Some or all of the components depicted in FIG. 7 can be implemented as program code running on a programmed processor running code stored on an electronic storage medium.


In one embodiment of the case of package media consistent with the present invention, the decoder or player used to decode the content encrypted under the new encryption algorithm may be functionally identical to a conventional decoder or player except for the substitution of a different decrypter or different decryption algorithm. In other exemplary embodiments, the decoder or player can be designed to recognize newly encrypted program chains while ignoring program chains associated with the old encryption algorithm.


In other embodiments consistent with the present invention, a method of playback of content stored on a recording medium involves reading a portion of the recording medium to determine that the recording medium contains content containing portions encrypted under multiple encryption techniques; selecting content having portions encrypted under one of the multiple encryption techniques; and playing the content, wherein the playing comprises decrypting the encrypted portion of the content.



FIG. 8 is a flow chart 150 that broadly illustrates the encryption process consistent with certain embodiments of the present invention starting at 154. At 158 the VOBU or other packet type that is to be encrypted is specified. In accordance with certain embodiments consistent with the present invention, the selected packet type may be any of the packets described above that generally contain data that makes it difficult to decode the content. Packets are then examined at 162 to identify packets of the specified type. At 166, the identified packets are duplicated and at 170 one set of these packets is encrypted under a the old “legacy” encryption method. The other set of identified packets is encrypted at 174 under a the new encryption method that is designed to replace the legacy encryption method. The originally identified packets are then replaced in the data with the two sets of encrypted packets at 180 and the process ends at 186. In certain embodiments, other steps are taken such as indexing the two program chains in the package medium, etc.


Thus, a method of upgrading an encryption process for encryption of video information from an old encryption process to a new encryption process, consistent with certain embodiments involves selecting a portion of video content for selective encryption. The selected portion is duplicated to produce first and second copies of the selected portion. The first copy is encrypted using the old encryption process and the second copy is encrypted using the new encryption process to produce a dual partially encrypted segment of video information that can either be broadcast over a cable or satellite system or stored in a package medium, for example, as two program chains.


Those skilled in the art will recognize that the present invention has been described in terms of exemplary embodiments based upon use of a programmed processor. However, the invention should not be so limited, since the present invention could be implemented using hardware component equivalents such as special purpose hardware and/or dedicated processors which are equivalents to the invention as described and claimed. Similarly, general purpose computers, microprocessor based computers, micro-controllers, optical computers, analog computers, dedicated processors and/or dedicated hard wired logic may be used to construct alternative equivalent embodiments of the present invention.


Those skilled in the art will appreciate that the program steps and associated data used to implement the embodiments described above can be implemented using disc storage as well as other forms of storage such as for example Read Only Memory (ROM) devices, Random Access Memory (RAM) devices; optical storage elements, magnetic storage elements, magneto-optical storage elements, flash memory, core memory and/or other equivalent storage technologies without departing from the present invention. Such alternative storage devices should be considered equivalents.


The present invention, as described in embodiments herein, is implemented using a programmed processor executing programming instructions that are broadly described above form that can be stored on any suitable electronic storage medium or transmitted over any suitable electronic communication medium or otherwise be present in any computer readable or propagation medium. However, those skilled in the art will appreciate that the processes described above can be implemented in any number of variations and in many suitable programming languages without departing from the present invention. For example, the order of certain operations carried out can often be varied, additional operations can be added or operations can be deleted without departing from the invention. Error trapping can be added and/or enhanced and variations can be made in user interface and information presentation without departing from the present invention. Such variations are contemplated and considered equivalent.


Software code and/or data embodying certain aspects of the present invention may be present in any computer readable medium, transmission medium, storage medium or propagation medium including, but not limited to, electronic storage devices such as those described above, as well as carrier waves, electronic signals, data structures (e.g., trees, linked lists, tables, packets, frames, etc.) optical signals, propagated signals, broadcast signals, transmission media (e.g., circuit connection, cable, twisted pair, fiber optic cables, waveguides, antennas, etc.) and other media that stores, carries or passes the code and/or data. Such media may either store the software code and/or data or serve to transport the code and/or data from one location to another. In the present exemplary embodiments, MPEG compliant packets, slices, tables and other data structures are used, but this should not be considered limiting since other data structures can similarly be used without departing from the present invention.


While the invention has been described in conjunction with specific embodiments, it is evident that many alternatives, modifications, permutations and variations will become apparent to those skilled in the art in light of the foregoing description. Accordingly, it is intended that the present invention embrace all such alternatives, modifications and variations as fall within the scope of the appended claims.

Claims
  • 1. A method of providing an upgrade for encryption used to encrypt video content stored in a Digital Versatile Disc (DVD) from an old encryption process to a new upgraded encryption process, comprising: selecting a portion of video content for dual partial encryption;dual partial encrypting the video content so that the video content has a clear portion, a portion encrypted using the old encryption process and a portion encrypted using the new upgraded encryption process;storing the dual partial encrypted video content on the DVD so that a first program chain stored on the DVD references the clear portion and the portion encrypted using the old encryption process, and so that a second program chain stored on the DVD references the clear portion and the portion encrypted using the new upgraded encryption process; andwherein encryption can be upgraded from the old encryption process to the new encryption process without modification to the DVD by decryption of the selected portions of the video content encrypted under the old encryption process using the first encryption chain when using a decryption device compatible with the old encryption process and encryption of the selected portions of the video content encrypted under the new encryption process using the new encryption chain when using a decryption device compatible with the new encryption process.
  • 2. The method according to claim 1, wherein the selected portion comprises a collection of video object units.
  • 3. A DVD storing content processed in accordance with the method of claim 2.
  • 4. The method according to claim 1, wherein the portion encrypted using the old encryption process and the portion encoded using the new upgraded encryption process are stored on the DVD using interleaved blocks.
  • 5. A DVD storing content processed in accordance with the method of claim 4.
  • 6. The method according to claim 1, wherein the old encryption process comprises a process that uses the Content Scrambling System algorithm (CSS).
  • 7. A DVD storing content processed in accordance with the method of claim 6.
  • 8. A DVD storing content processed in accordance with the method of claim 1.
  • 9. A method of providing an upgrade for encryption used for encryption of video content stored in package medium from an old encryption process to a new upgraded encryption process, comprising: selecting a portion of video content for selective encryption;duplicating the selected portion of content to produce first and second copies of the selected portion;encrypting the first copy of the selected portion using the old encryption process;encrypting the second copy of the selected portion using the new upgraded encryption process;storing the portion of the video content which is not selected as clear content on the package medium;storing the encrypted first copy and the encrypted second copy of the selected portion on the package medium;storing a first program chain that references the clear portion and the portion encrypted using the old encryption process, storing a second program chain that references the clear portion and the portion encrypted using the new upgraded encryption process on the packaged medium; andwherein encryption can be upgraded from the old encryption process to the new encryption process without modification to the package medium by decryption of the selected portions of the video content encrypted under the old encryption process using the first program chain when using a device compatible with the old encryption process, and encryption of the selected portions of the video content encrypted under the new encryption process using the new encryption chain when using a device compatible with the new encryption process.
  • 10. The method according to claim 9, wherein the package medium comprises a DVD.
  • 11. A DVD storing content processed in accordance with the method of claim 10.
  • 12. The method according to claim 9, wherein the old encryption process comprises a process that uses the Content Scrambling System algorithm (CSS).
  • 13. A DVD storing content processed in accordance with the method of claim 9.
  • 14. A method of playback of content stored on a recording medium using a playback device having a decrypter capable of operating using only one of multiple decryption techniques, comprising: reading a portion of the recording medium to determine that the recording medium contains content containing portions encrypted under multiple encryption techniques;selecting content having portions encrypted under only the one of the multiple encryption techniques said one of the encryption techniques being the one compatible with said playback device;playing the content, wherein the playing comprises decrypting the encrypted portion of the content; andwherein encryption can be upgraded from the old encryption process to the new encryption process without modification to the DVD by decryption of the selected portions of the video content encrypted under the old encryption process using the first encryption chain when using a decryption device compatible with the old encryption process and encryption of the selected portions of the video content encrypted under the new encryption process using the new encryption chain when using a decryption device compatible with the new encryption process; andwherein the multiple encryption techniques comprise a legacy encryption technique and an encryption technique to be used as a replacement for the legacy encryption technique; andwherein the selected content has portions encrypted under the legacy encryption technique; andwherein the selecting comprises selecting a program chain containing the portions encrypted under the legacy encryption technique.
  • 15. The method according to claim 14, wherein the selected content has portions encrypted under the replacement for the legacy encryption technique.
  • 16. The method according to claim 15, wherein the selecting comprises selecting a program chain containing the portions encrypted under the replacement for the legacy encryption technique.
  • 17. A method of providing an upgrade for encryption used for encryption of video content for electronic distribution by a content provider from an old encryption process to a new encryption process, comprising: selecting a portion of video content for dual partial encryption;dual partial encrypting the video content so that the video content has a clear portion, a portion encrypted using the old encryption process and a portion encrypted using the new encryption process;transmitting the dual partial encrypted video content over a broadcast medium; andwherein encryption can be upgraded from the old encryption process to the new encryption process by decryption of the selected portions of the video content encrypted under the old encryption process when using a receiver device compatible with the old encryption process and encryption of the selected portions of the video content encrypted under the new encryption process when using an upgraded receiver device compatible with the new encryption process.
  • 18. The method according to claim 17, wherein the broadcast medium comprises one of a cable and a satellite network.
  • 19. The method according to claim 17, further comprising assigning program identifiers (PIDs) to distinguish between the portions encrypted using the old encryption process and the portion encrypted under the new encryption process.
  • 20. The method according to claim 17, wherein the old encryption process comprises a data encryption standard (DES) encryption process.
  • 21. The method according to claim 17, wherein the new encryption process comprises one of Triple DES, Advanced Encryption Standard (AES) and Common Scrambling Algorithm (CSA).
  • 22. A method of decoding a stream of packets containing electronically distributed video content from a content provider, wherein the content is dual partially encrypted using an old encryption process and a new encryption process, the method being carried out at a decoding device compatible with the new encryption process comprising: receiving the stream of dual partially encrypted video content at the decoding device compatible with the new encryption process;discarding packets encrypted by the old encryption process;decrypting packets encrypted by the new encryption process;combining the decrypted packets with unencrypted packets to create a clear stream of packets for decoding; andwherein encryption can be upgraded from the old encryption process to the new encryption process without modification to the stream of packets by decryption of the selected portions of the video content encrypted under the old encryption process when the decoding device is compatible with the old encryption process and encryption of the selected portions of the video content encrypted under the new encryption process when the decoding device is compatible with the new encryption process.
  • 23. The method according to claim 22, wherein the stream of dual partially encrypted video content is received over one of a cable network and a satellite network.
  • 24. The method according to claim 22, wherein program identifiers (PIDs) are used to distinguish between the portions encrypted using the old encryption process and the portion encrypted under the new encryption process, and wherein the discarding comprises discarding packets identified by the PID associated with the old encryption process.
  • 25. The method according to claim 22, wherein the old encryption process comprises a data encryption standard (DES) encryption process.
  • 26. The method according to claim 22, wherein the new encryption process comprises one of Triple DES, Advanced Encryption Standard (AES) and Common Scrambling Algorithm (CSA).
  • 27. A method of upgrading an encryption process for encryption of video information from an old encryption process to a new upgraded encryption process, comprising: selecting a portion of video content for selective encryption;duplicating the selected portion of content to produce first and second copies of the selected portion;encrypting the first copy of the selected portion using the old encryption process;encrypting the second copy of the selected portion using the new upgraded encryption process; andwherein the unselected portion and the encrypted first copy are stored as a first program chain and wherein the unselected portion and the encrypted second copy are stored as a second program chain, and wherein said storage is carried out on a packaged medium; andwherein encryption can be upgraded from the old encryption process to the new encryption process without modification to the video information by selection of the first program chain thereby using the selected portions of the video content encrypted under the old encryption process when using a playback device compatible with the old encryption process and using the second program chain and thereby using the selected portions of the video content encrypted under the new encryption process when using a playback device compatible with the new encryption process.
  • 28. The method according to claim 27, further comprising transmitting the encrypted first copy and encrypted second copy along with unselected portions of the video content over one of a cable network and a satellite network.
  • 29. The method according to claim 27, further comprising distinguishing between the portions encrypted using the old encryption process and the portion encrypted under the new encryption process by assigning distinctive program identifiers (PIDs) to each.
  • 30. The method according to claim 27, wherein the old encryption process comprises a data encryption standard (DES) encryption process.
  • 31. The method according to claim 27, wherein the new encryption process comprises one of Triple DES, Advanced Encryption Standard (AES) and Common Scrambling Algorithm (CSA).
  • 32. The method according to claim 27, further comprising storing the encrypted first copy and encrypted second copy along with unselected portions of the video content a digital versatile disc (DVD).
  • 33. The method according to claim 32, wherein the old encryption process comprises a process that uses the Content Scrambling System algorithm (CSS).
CROSS REFERENCE TO RELATED DOCUMENTS

This application claims priority to U.S. Provisional Application No. 60/409,675, filed Sep. 9, 2002 which is hereby incorporated by reference, and is a continuation-in-part of U.S. patent application Ser. No. 10/037,914, filed Jan. 2, 2002, now U.S. Pat. No. 7,124,303 which claims priority of U.S. Provisional Application Nos. 60/296,673 filed Jun. 6, 2001; 60/304,241, filed Jul. 10, 2001; and 60/304,131, filed Jul. 10, 2001. This application is related to patent applications entitled “Critical Packet Partial Encryption” to Unger et al., Ser. No. 10/038,217; patent applications entitled “Time Division Partial Encryption” to Candelore et al., Ser. No. 10/038,032; entitled “Partial Encryption and PID Mapping” to Unger et al., Ser. No. 10/037,499; and entitled “Decoding and Decrypting of Partially Encrypted Information” to Unger et al., Ser. No. 10/037,498 all of which were filed on Jan. 2, 2002. This application is also related to U.S. patent applications Ser. No. 10/273,905, filed Oct. 18, 2002 to Candelore et al. entitled “Video Slice and Active Region Based Dual Partial Encryption”, which is hereby incorporated by reference; Ser. No. 10/273,903, filed Oct. 18, 2002 to Candelore et al. entitled “Star Pattern Partial Encryption”; Ser. No. 10/274,084, filed Oct. 18, 2002 to Candelore et al. entitled “Slice Mask and Moat Pattern Partial Encryption”, and Ser. No. 10/274,019, filed Oct. 18, 2002 to Candelore et al. entitled “Video Scene Change Detection”. These applications are hereby incorporated by reference.

US Referenced Citations (409)
Number Name Date Kind
3852519 Court Dec 1974 A
4381519 Wilkinson et al. Apr 1983 A
4419693 Wilkinson Dec 1983 A
4521853 Guttag Jun 1985 A
4634808 Moerder Jan 1987 A
4700387 Hirata Oct 1987 A
4703351 Kondo Oct 1987 A
4703352 Kondo Oct 1987 A
4710811 Kondo Dec 1987 A
4712238 Gilhousen et al. Dec 1987 A
4722003 Kondo Jan 1988 A
4739510 Jeffers et al. Apr 1988 A
4772947 Kondo Sep 1988 A
4785361 Brotby Nov 1988 A
4788589 Kondo Nov 1988 A
4815078 Shimura Mar 1989 A
4845560 Kondo et al. Jul 1989 A
4887296 Horne Dec 1989 A
4890161 Kondo Dec 1989 A
4914515 Van Luyt Apr 1990 A
4924310 von Brandt May 1990 A
4944006 Citta et al. Jul 1990 A
4953023 Kondo Aug 1990 A
4989245 Bennett Jan 1991 A
4995080 Bestler et al. Feb 1991 A
5018197 Jones et al. May 1991 A
5023710 Kondo et al. Jun 1991 A
5091938 Katznelson Feb 1992 A
5122873 Golin Jun 1992 A
5138659 Kelkar et al. Aug 1992 A
5142537 Kutner et al. Aug 1992 A
5144662 Welmer Sep 1992 A
5144664 Esserman et al. Sep 1992 A
5151782 Ferraro Sep 1992 A
5159452 Kinoshita et al. Oct 1992 A
5196931 Kondo Mar 1993 A
5208816 Seshardi et al. May 1993 A
5237424 Nishino et al. Aug 1993 A
5237610 Gammie et al. Aug 1993 A
5241381 Kondo Aug 1993 A
5247575 Sprague et al. Sep 1993 A
5258835 Kato Nov 1993 A
5319707 Wasilewski et al. Jun 1994 A
5319712 Finkelstein et al. Jun 1994 A
5325432 Gardeck et al. Jun 1994 A
5327502 Katata Jul 1994 A
5341425 Wasilewski et al. Aug 1994 A
5359694 Concordel Oct 1994 A
5379072 Kondo Jan 1995 A
5381481 Gammie et al. Jan 1995 A
5398078 Masuda et al. Mar 1995 A
5400401 Wasilewski et al. Mar 1995 A
5414852 Kramer et al. May 1995 A
5416651 Uetake et al. May 1995 A
5416847 Boze May 1995 A
5420866 Wasilewski May 1995 A
5428403 Andrew et al. Jun 1995 A
5434716 Sugiyama et al. Jul 1995 A
5438369 Citta et al. Aug 1995 A
5444491 Lim Aug 1995 A
5444782 Adams, Jr. et al. Aug 1995 A
5455862 Hoskinson Oct 1995 A
5469216 Takahashi et al. Nov 1995 A
5471501 Parr et al. Nov 1995 A
5473692 Davis Dec 1995 A
5481554 Kondo Jan 1996 A
5481627 Kim Jan 1996 A
5485577 Eyer et al. Jan 1996 A
5491748 Auld, Jr. et al. Feb 1996 A
5526427 Thomas et al. Jun 1996 A
5528608 Shimizume Jun 1996 A
5535276 Ganesan Jul 1996 A
5539823 Martin Jul 1996 A
5539828 Davis Jul 1996 A
5553141 Lowry et al. Sep 1996 A
5555305 Robinson et al. Sep 1996 A
5561713 Suh Oct 1996 A
5568552 Davis Oct 1996 A
5574787 Ryan Nov 1996 A
5582470 Yu Dec 1996 A
5583576 Perlman et al. Dec 1996 A
5583863 Darr, Jr. et al. Dec 1996 A
5590202 Bestler et al. Dec 1996 A
5598214 Kondo et al. Jan 1997 A
5600721 Kitazato Feb 1997 A
5606359 Youden et al. Feb 1997 A
5608448 Smoral et al. Mar 1997 A
5615265 Coutrot Mar 1997 A
5617333 Oyamada et al. Apr 1997 A
5625715 Trew et al. Apr 1997 A
5629981 Nerlikar May 1997 A
5652795 Eillon et al. Jul 1997 A
5663764 Kondo et al. Sep 1997 A
5666293 Metz et al. Sep 1997 A
5696906 Peters et al. Dec 1997 A
5699429 Tamer et al. Dec 1997 A
5703889 Shimoda et al. Dec 1997 A
5717814 Abecassis Feb 1998 A
5726702 Hamaguchi et al. Mar 1998 A
5726711 Boyce Mar 1998 A
5732346 Lazaridis et al. Mar 1998 A
5742680 Wilson Apr 1998 A
5742681 Giachetti et al. Apr 1998 A
5751280 Abbott et al. May 1998 A
5751743 Takizawa May 1998 A
5751813 Dorenbos May 1998 A
5754650 Katznelson May 1998 A
5754658 Aucsmith May 1998 A
5757417 Aras et al. May 1998 A
5757909 Park May 1998 A
5768539 Metz et al. Jun 1998 A
5796786 Lee Aug 1998 A
5796829 Newby et al. Aug 1998 A
5796840 Davis Aug 1998 A
5802176 Audebert Sep 1998 A
5805700 Nardone et al. Sep 1998 A
5805712 Davis Sep 1998 A
5805762 Boyce et al. Sep 1998 A
5809147 De Lange et al. Sep 1998 A
5815146 Youden et al. Sep 1998 A
5818934 Cuccia Oct 1998 A
5825879 Davis Oct 1998 A
5850218 LaJoie et al. Dec 1998 A
5852290 Chaney Dec 1998 A
5852470 Kondo et al. Dec 1998 A
5870474 Wasiliewski et al. Feb 1999 A
5894320 Vancelette Apr 1999 A
5894516 Brandenburg Apr 1999 A
5915018 Aucsmith Jun 1999 A
5917830 Chen et al. Jun 1999 A
5922048 Emura Jul 1999 A
5923755 Birch et al. Jul 1999 A
5930361 Hayashi et al. Jul 1999 A
5933500 Blatter et al. Aug 1999 A
5940738 Rao Aug 1999 A
5949877 Traw et al. Sep 1999 A
5949881 Davis Sep 1999 A
5963909 Warren et al. Oct 1999 A
5973679 Abbott et al. Oct 1999 A
5973722 Wakai et al. Oct 1999 A
5973726 Iijima et al. Oct 1999 A
5999622 Yasukawa et al. Dec 1999 A
5999698 Nakai et al. Dec 1999 A
6005561 Hawkins et al. Dec 1999 A
6011849 Orrin Jan 2000 A
6012144 Pickett Jan 2000 A
6016348 Blatter et al. Jan 2000 A
6021199 Ishibashi Feb 2000 A
6021201 Bakhle et al. Feb 2000 A
6026164 Sakamoto et al. Feb 2000 A
6028932 Park Feb 2000 A
6049613 Jakobsson Apr 2000 A
6055314 Spies et al. Apr 2000 A
6055315 Doyle et al. Apr 2000 A
6057872 Candelore May 2000 A
6058186 Enari May 2000 A
6058192 Guralnick et al. May 2000 A
6061451 Muratani et al. May 2000 A
6064748 Hogan May 2000 A
6065050 DeMoney May 2000 A
6069647 Sullivan et al. May 2000 A
6070245 Murphy, Jr. et al. May 2000 A
6072872 Chang et al. Jun 2000 A
6072873 Bewick Jun 2000 A
6073122 Wool Jun 2000 A
6088450 Davis et al. Jul 2000 A
6105134 Pinder et al. Aug 2000 A
6108422 Newby et al. Aug 2000 A
6115821 Newby et al. Sep 2000 A
6118873 Lotspiech et al. Sep 2000 A
6134237 Brailean et al. Oct 2000 A
6134551 Aucsmith Oct 2000 A
6138237 Ruben et al. Oct 2000 A
6148082 Slattery et al. Nov 2000 A
6154206 Ludtke Nov 2000 A
6157719 Wasilewski et al. Dec 2000 A
6181334 Freeman et al. Jan 2001 B1
6185369 Ko et al. Feb 2001 B1
6185546 Davis Feb 2001 B1
6189096 Haverty Feb 2001 B1
6192131 Geer et al. Feb 2001 B1
6199053 Herbert et al. Mar 2001 B1
6204843 Freeman et al. Mar 2001 B1
6209098 Davis Mar 2001 B1
6215484 Freeman et al. Apr 2001 B1
6222924 Salomaki Apr 2001 B1
6223290 Larsen et al. Apr 2001 B1
6226618 Downs May 2001 B1
6229895 Son et al. May 2001 B1
6230194 Frailong et al. May 2001 B1
6230266 Perlman et al. May 2001 B1
6236727 Ciacelli et al. May 2001 B1
6240553 Son et al. May 2001 B1
6246720 Kutner et al. Jun 2001 B1
6256747 Inohara et al. Jul 2001 B1
6263506 Ezaki et al. Jul 2001 B1
6266416 Sigbjornsen et al. Jul 2001 B1
6266480 Ezaki et al. Jul 2001 B1
6272538 Holden et al. Aug 2001 B1
6278783 Kocher et al. Aug 2001 B1
6289455 Kocher et al. Sep 2001 B1
6292568 Atkins, III et al. Sep 2001 B1
6292892 Davis Sep 2001 B1
6307939 Vigarie Oct 2001 B1
6311012 Cho et al. Oct 2001 B1
6324288 Hoffman Nov 2001 B1
6351538 Uz Feb 2002 B1
6351813 Mooney et al. Feb 2002 B1
6377589 Knight et al. Apr 2002 B1
6378130 Adams Apr 2002 B1
6389533 Davis et al. May 2002 B1
6389537 Davis et al. May 2002 B1
6415031 Colligan et al. Jul 2002 B1
6415101 deCarmo et al. Jul 2002 B1
6418169 Datari Jul 2002 B1
6424717 Pinder et al. Jul 2002 B1
6430361 Lee Aug 2002 B2
6445738 Zdepski et al. Sep 2002 B1
6449718 Rucklidge et al. Sep 2002 B1
6452923 Gerszberg et al. Sep 2002 B1
6453115 Boyle Sep 2002 B1
6456985 Ohtsuka Sep 2002 B1
6459427 Mao et al. Oct 2002 B1
6463152 Takahashi Oct 2002 B1
6466671 Maillard et al. Oct 2002 B1
6505032 McCorkle et al. Jan 2003 B1
6505299 Zeng et al. Jan 2003 B1
6510554 Gorden et al. Jan 2003 B1
6519693 Debey Feb 2003 B1
6526144 Markandey et al. Feb 2003 B2
6529526 Schneidewend Mar 2003 B1
6543053 Li et al. Apr 2003 B1
6549229 Kirby et al. Apr 2003 B1
6550008 Zhang et al. Apr 2003 B1
6557031 Mimura et al. Apr 2003 B1
6587561 Sered et al. Jul 2003 B1
6590979 Ryan Jul 2003 B1
6640145 Hoffberg et al. Oct 2003 B2
6640305 Kocher et al. Oct 2003 B2
6650754 Akiyama et al. Nov 2003 B2
6654389 Brunheroto et al. Nov 2003 B1
6678740 Rakib et al. Jan 2004 B1
6681326 Son et al. Jan 2004 B2
6684250 Anderson et al. Jan 2004 B2
6697489 Candelore Feb 2004 B1
6697944 Jones et al. Feb 2004 B1
6707696 Turner et al. Mar 2004 B1
6714650 Maillard et al. Mar 2004 B1
6754276 Harumoto et al. Jun 2004 B1
6772340 Peinado et al. Aug 2004 B1
6788690 Harri Sep 2004 B2
6788882 Geer et al. Sep 2004 B1
6826185 Montanaro et al. Nov 2004 B1
6883050 Safadi Apr 2005 B1
6891565 Dietrich May 2005 B1
6895128 Bohnenkamp May 2005 B2
6904520 Rosset et al. Jun 2005 B1
6917684 Tatebayashi et al. Jul 2005 B1
6936152 Nagai et al. Aug 2005 B2
6938162 Nagai et al. Aug 2005 B1
6976166 Herley et al. Dec 2005 B2
7039802 Eskicioglu et al. May 2006 B1
7039938 Candelore May 2006 B2
7065213 Pinder Jun 2006 B2
7096481 Forecast et al. Aug 2006 B1
7120250 Candelore Oct 2006 B2
7124303 Candelore Oct 2006 B2
7127619 Unger et al. Oct 2006 B2
7139396 Candelore et al. Nov 2006 B2
7139398 Candelore et al. Nov 2006 B2
7146007 Maruo et al. Dec 2006 B1
7151831 Candelore et al. Dec 2006 B2
7151833 Candelore et al. Dec 2006 B2
7155012 Candelore et al. Dec 2006 B2
20010030959 Ozawa et al. Oct 2001 A1
20010036271 Javed Nov 2001 A1
20010051000 Teshima Dec 2001 A1
20010051007 Teshima Dec 2001 A1
20020003881 Reitmeier et al. Jan 2002 A1
20020021805 Schumann et al. Feb 2002 A1
20020026587 Talstra et al. Feb 2002 A1
20020046406 Chelehmal et al. Apr 2002 A1
20020047915 Misu Apr 2002 A1
20020059425 Belfiore et al. May 2002 A1
20020066101 Gordon et al. May 2002 A1
20020083317 Ohta et al. Jun 2002 A1
20020083438 So et al. Jun 2002 A1
20020097322 Monroe et al. Jul 2002 A1
20020108035 Herley et al. Aug 2002 A1
20020116705 Perlman et al. Aug 2002 A1
20020126890 Katayama et al. Sep 2002 A1
20020129243 Nanjundiah Sep 2002 A1
20020144260 Devara Oct 2002 A1
20020150239 Carny et al. Oct 2002 A1
20020157115 Lu Oct 2002 A1
20020157116 Lu Oct 2002 A1
20020164022 Strasser et al. Nov 2002 A1
20020170053 Peterka et al. Nov 2002 A1
20020184508 Perlman Dec 2002 A1
20020194613 Unger Dec 2002 A1
20020196939 Unger et al. Dec 2002 A1
20030002854 Belknap et al. Jan 2003 A1
20030009669 White et al. Jan 2003 A1
20030012286 Ishtiaq et al. Jan 2003 A1
20030021412 Candelore et al. Jan 2003 A1
20030026423 Unger et al. Feb 2003 A1
20030026523 Unger et al. Feb 2003 A1
20030028879 Gordon et al. Feb 2003 A1
20030035482 Klompenhouwer et al. Feb 2003 A1
20030035540 Freeman et al. Feb 2003 A1
20030035543 Gillon Feb 2003 A1
20030046686 Candelore et al. Mar 2003 A1
20030046687 Hodges et al. Mar 2003 A1
20030059047 Iwamura Mar 2003 A1
20030063615 Luoma et al. Apr 2003 A1
20030072555 Yap et al. Apr 2003 A1
20030077071 Lin et al. Apr 2003 A1
20030081630 Mowery et al. May 2003 A1
20030081776 Candelore May 2003 A1
20030084284 Ando et al. May 2003 A1
20030097662 Russ et al. May 2003 A1
20030112333 Chen et al. Jun 2003 A1
20030118243 Sezer et al. Jun 2003 A1
20030123664 Pedlow, Jr. et al. Jul 2003 A1
20030123849 Nallur et al. Jul 2003 A1
20030126086 Safadi Jul 2003 A1
20030133570 Candelore et al. Jul 2003 A1
20030140257 Peterka et al. Jul 2003 A1
20030145329 Candelore Jul 2003 A1
20030152224 Candelore et al. Aug 2003 A1
20030152226 Candelore et al. Aug 2003 A1
20030156718 Candelore et al. Aug 2003 A1
20030159139 Candelore et al. Aug 2003 A1
20030159140 Candelore Aug 2003 A1
20030159152 Lin et al. Aug 2003 A1
20030174837 Candelore et al. Sep 2003 A1
20030174844 Candelore Sep 2003 A1
20030188154 Dallard Oct 2003 A1
20030188164 Okimoto et al. Oct 2003 A1
20030190054 Troyansky et al. Oct 2003 A1
20030193973 Takashimizu et al. Oct 2003 A1
20030198223 Mack et al. Oct 2003 A1
20030204717 Kuehnel Oct 2003 A1
20030222994 Dawson Dec 2003 A1
20030226149 Chun et al. Dec 2003 A1
20030228018 Vince Dec 2003 A1
20040003008 Wasilewski et al. Jan 2004 A1
20040010717 Simec et al. Jan 2004 A1
20040021764 Driscoll, Jr. et al. Feb 2004 A1
20040028227 Yu Feb 2004 A1
20040047470 Candelore Mar 2004 A1
20040049688 Candelore et al. Mar 2004 A1
20040049690 Candelore et al. Mar 2004 A1
20040049691 Candelore et al. Mar 2004 A1
20040049694 Candelore Mar 2004 A1
20040064688 Jacobs Apr 2004 A1
20040068659 Diehl Apr 2004 A1
20040073917 Pedlow, Jr. et al. Apr 2004 A1
20040078575 Morten et al. Apr 2004 A1
20040081333 Grab et al. Apr 2004 A1
20040086127 Candelore May 2004 A1
20040088552 Candelore May 2004 A1
20040088558 Candelore May 2004 A1
20040091109 Son et al. May 2004 A1
20040100510 Milic-Frayling et al. May 2004 A1
20040123094 Sprunk Jun 2004 A1
20040136532 Pinder et al. Jul 2004 A1
20040139337 Pinder et al. Jul 2004 A1
20040151314 Candelore Aug 2004 A1
20040158721 Candelore Aug 2004 A1
20040165586 Read et al. Aug 2004 A1
20040172650 Hawkins et al. Sep 2004 A1
20040181666 Candelore Sep 2004 A1
20040187161 Cao Sep 2004 A1
20040193550 Siegal Sep 2004 A1
20040240668 Bonan et al. Dec 2004 A1
20040247122 Hobrock et al. Dec 2004 A1
20040261099 Durden et al. Dec 2004 A1
20040267602 Gaydos et al. Dec 2004 A1
20050004875 Kontio et al. Jan 2005 A1
20050028193 Candelore et al. Feb 2005 A1
20050036067 Ryal et al. Feb 2005 A1
20050063541 Candelore Mar 2005 A1
20050066357 Ryal Mar 2005 A1
20050071669 Medvinsky et al. Mar 2005 A1
20050094808 Pedlow, Jr. et al. May 2005 A1
20050094809 Pedlow, Jr. et al. May 2005 A1
20050097596 Pedlow, Jr. May 2005 A1
20050097597 Pedlow, Jr. et al. May 2005 A1
20050097598 Pedlow, Jr. et al. May 2005 A1
20050097614 Pedlow, Jr. et al. May 2005 A1
20050102702 Candelore et al. May 2005 A1
20050129233 Pedlow, Jr. Jun 2005 A1
20050141713 Genevois Jun 2005 A1
20050169473 Candelore Aug 2005 A1
20050192904 Candelore Sep 2005 A1
20050198586 Sekiguchi et al. Sep 2005 A1
20050259813 Wasilewski et al. Nov 2005 A1
20050265470 Strasser et al. Dec 2005 A1
20050265547 Strasser et al. Dec 2005 A1
20060115083 Candelore et al. Jun 2006 A1
20060130119 Candelore et al. Jun 2006 A1
20060130121 Candelore et al. Jun 2006 A1
20060136976 Coupe et al. Jun 2006 A1
20060153379 Candelore et al. Jul 2006 A1
20060168616 Candelore Jul 2006 A1
20060174264 Candelore Aug 2006 A1
20060262926 Candelore et al. Nov 2006 A1
20060269060 Candelore et al. Nov 2006 A1
Foreign Referenced Citations (21)
Number Date Country
0471373 Feb 1992 EP
0527611 Jul 1992 EP
0558016 Feb 1993 EP
0596826 Apr 1993 EP
0610587 Dec 1993 EP
0680209 Apr 1995 EP
0674440 Sep 1995 EP
0674441 Sep 1995 EP
0833517 Apr 1998 EP
0866615 Sep 1998 EP
1 187 483 Mar 2002 EP
1187483 Mar 2002 EP
7067028 Mar 1995 JP
11243534 Oct 2002 JP
WO 8607224 Dec 1986 WO
WO 9410775 May 1994 WO
WO 9738530 Oct 1997 WO
WO 0031964 Jun 2000 WO
WO 0165762 Sep 2001 WO
WO 0178386 Oct 2001 WO
WO 0178386 Oct 2001 WO
Related Publications (2)
Number Date Country
20040049688 A1 Mar 2004 US
20070271470 A9 Nov 2007 US
Provisional Applications (4)
Number Date Country
60409675 Sep 2002 US
60296673 Jun 2001 US
60304241 Jul 2001 US
60304131 Jul 2001 US
Continuation in Parts (1)
Number Date Country
Parent 10037914 Jan 2002 US
Child 10293761 US