IL209263A - Methods and devices for sending an enciphered multimedia content in bursts and recording carrier for these methods - Google Patents

Methods and devices for sending an enciphered multimedia content in bursts and recording carrier for these methods

Info

Publication number
IL209263A
IL209263A IL209263A IL20926310A IL209263A IL 209263 A IL209263 A IL 209263A IL 209263 A IL209263 A IL 209263A IL 20926310 A IL20926310 A IL 20926310A IL 209263 A IL209263 A IL 209263A
Authority
IL
Israel
Prior art keywords
duration
instant
segment
tekj
key
Prior art date
Application number
IL209263A
Other languages
Hebrew (he)
Other versions
IL209263A0 (en
Original Assignee
Viaccess Sa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Viaccess Sa filed Critical Viaccess Sa
Publication of IL209263A0 publication Critical patent/IL209263A0/en
Publication of IL209263A publication Critical patent/IL209263A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H60/00Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
    • H04H60/09Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
    • H04H60/14Arrangements for conditional access to broadcast information or to broadcast-related services
    • H04H60/23Arrangements for conditional access to broadcast information or to broadcast-related services using cryptography, e.g. encryption, authentication, key distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26606Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/438Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving encoded video stream packets from an IP network
    • H04N21/4383Accessing a communication channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/643Communication protocols
    • H04N21/64315DVB-H

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

27938/10 Πΰ7ϊ7π -"u^ Ni α^^πα lguin ΓΓΊΤΓΰ^ιτ] IDIJI πτΓ7_υ mar αΊ3ί7Γΐπι πΐϊτω Π Ν miru rwtu METHODS AND DEVICES FOR SENDING AN ENCIPHERED MULTIMEDIA CONTENT IN BURSTS, RECORDING CARRIER FOR THESE METHODS METHODS AND DEVICES FOR SENDING AN ENCIPHERED MULTIMEDIA CONTENT IN BURSTS, RECORDING CARRIER FOR THESE METHODS The invention relates to methods and devices for sending an enciphered multimedia content in bursts as well as an information-recording carrier to implement these methods.
There are methods known to the Applicant for sending an enciphered multimedia content in bursts, this method comprising: a) the choosing of any unspecified duration T for successive cryplo-periods, b) the replacing, by means of a synchronizer, of an encipherment current key TEKj by a new current key TEKj+i at each end of a crypto-period, c) the enciphering of Pi immediately consecutive segments of the multimedia content with the current encipherment key, each segment P, starting at a respective instant d) the building, by means of a generator, of a burst Sj for which the duration of reception is shorter than the duration of playing of the segment P,, the burst S, containing the enciphered segment P, and a cryptogram of each current key used to encipher the segment Pi.
Bursts* are most commonly known by the English term "burst".
The multimedia content is a content containing audio and/or video material. For example, a multimedia content may be a film, an audiovisual program, a television channel, music or the like. A multimedia content is sometimes also called a "service". The multimedia content is designed to be played by a receiver as and when it is received.
The duration of play of a segment of the content is the duration needed to play the segment considered at normal speed on a receiver.
Here, the terms "encipher" and "scramble" are considered to be interchangeable.
The sending of enciphered multimedia contents in bursts is described for example in the DVB-H (Digital Video Broadcast-Handheld) standard or similar standards. The reader could refer to this standard for more details on the designing and sending of bursts.
Sending enciphered multimedia contents in bursts has been defined to enable a mobile receiver to save energy during the reception of these multimedia contents. The mobile receiver is for example a mobile telephone, a personal digital assistant, a portable television set, a portable media player (PMP) or again a laptop computer.
In these sending methods, the multimedia content is divided into a succession of immediately consecutive segments P, where the index i indicates the order number of a particular segment in this succession. A segment corresponds to a fraction of the multimedia content incorporated and transmitted by a single burst. Thus, a burst contains one and only one segment Pj. The burst which contains the segment P, is denoted as S,.
Each segment is compressed and enciphered before being transmitted in a burst. This compression of the segment gives a burst whose duration of reception is shorter than the duration of playing of the segment P,.
In practice, several multimedia contents are sent simultaneously. To this end, bursts corresponding to different multimedia contents are temporarily multiplexed. For example, time slots at regular intervals are allocated to the bursts of a specific multimedia content. These time slots allocated to a specific multimedia content define a channel.
The receiver of these bursts processes only one channel at a time. Thus, between two consecutive bursts of this channel, the receiver can remain inactive, thus saving energy.
The management of the encipherment keys to secure the transmission of this multimedia content is done by a "key management system" which is part of the contents protection system implemented. For example, the description here is made with reference to a key management system of the contents protection system defined in the OMA-BCAST Smartcard Profile (Open Mobile Alliance-Broadcast Services Enabler Suite Smartcard Profile). Thus, in this description, the terminology used is the one defined in this standard.
In a system compliant with the OMA-BCAST Smartcard Profile standard, a TEKj (Traffic Encryption Key) key is used to encipher the segments currently sent out by the multimedia content. The TEKj is changed at regular intervals. These intervals are known as crypto-periods. For example, a crypto-period lasts less than one minute. Typically, a crypto-period lasts five to ten seconds. Here, each crypto-period is denoted as Tj, where j is an order number of the crypto-period. During the crypto-period Tj, only the key TEKj is used to encipher the multimedia content. Then, during the immediately consecutive crypto-period Tj+i, only the key TEKj+i is used to encipher the multimedia content and so on and so forth.
At least one STKMj (Short Time Key Message) is included in each burst so that the segment P, contained in this burst can be deciphered. Each STKMj message contains a cryptogram of the TEKj. In the OMA-BCAST Smartcard Profile standard, an STKM message can contain only one cryptogram of a TEK key. An STKM message often also contains conditions of accessing the multimedia content that have to be compared with rights of access pre-recorded in a memory of the receiver in order to authorizat and alternately prohibit the deciphering of the multimedia content.
When a mobile receiver receives a burst, it must decipher the cryptogram of the TEKj contained in the STKMj message before it can decipher the segment Pi contained in this burst. The deciphering of the cryptogram of the key TEKj takes a certain time denoted TSTKM- Thus, when a user changes a channel, i.e. when he zaps or when he tries to turn his receiver on, the deciphering of the segment P, encapsulated in the first burst S, received can start, at the earliest, TSTKM after the start of reception of this burst.
Furthermore, another problem may arise during a change in channel. To explain this, reference is made to figures 1 and 2. Figure 1 represents a succession of immediately consecutive segments P( of a multimedia content played at normal speed. Each segment P, starts at an instant tdj. This instant tdj is indicated on a time axis 2.
A second time axis 4 represents the crypto-periods on the same scale. Here, two crypto-periods Tj and Tj+ are shown. During the crypto-period Tj, the segments are enciphered by means of the TEKj key. This crypto-period Tj is completed at the instant at which the next crypto-period Tj+1 starts, i.e. at an instant tej+i. During the crypto-period Tj+i , the key used to encipher the segments of the multimedia content is the TEKj+1 key.
In the particular case shown in figure 1 , the change in crypto-period takes place between the instants tdi and +TSTKM- Thus, the start of the segment P, is first of all enciphered with the key TEKj up to the instant tej+i . Then, the end of this segment is enciphered with the key TEKj+i . The burst S, which contains the segment P, must therefore contain the two keys TEKj and TEKj+i to enable the deciphering of the segment P,. To this end, to be compliant with the OMA-BCAST Smartcard Profile standard, this burst Sj contains two STKMj messages and STKMj+1 respectively containing the cryptograms of the keys TEKj and TEKj+i .
Let us now assume that a user has just changed channels and has zapped to the channel corresponding to the burst S, so that the receiver does not yet have any information on this channel. In these conditions, the receiver awaits reception of the first complete burst on this channel. It is assumed that this first burst is the burst S, containing the segment Pi. The burst Si is received at the instant ts, shown in the time axis 6 of figure 2.
Once the burst Sj has been received, the receiver deciphers the cryptogram of the key TEKj which takes a period of time TSTK . Hence, before the instant tsi + TSTKM, the receiver cannot play the multimedia content received in cleartext. This corresponds to a period of time 8 in figure 2. For example, during this period 8, the receiver displays only a black screen or allows no sound to be heard.
The term playing as "cleartext" designates the playing of a multimedia content after it has been deciphered. Thus, a multimedia content in cleartext corresponds to images or sounds that are directly perceptible and comprehensible to the user of the receiver.
Starting with the instant tsi + TSTKM, the receiver starts displaying the start of the segment P, very clearly.
From the instant tsi + TSTKM to the instant tsi + TST M + tej+i - the start of the segment P, is displayed in cleartext. This period bears the reference 10 in figure 2.
Furthermore, in parallel and starting from the instant tsi + TSTKM, the receiver deciphers the cryptogram of the TEKi+i . Consequently, the display in cleartext mode of the end of the segment P, can at the earliest start only from the instant tSi + 2TSTK .
Now, here the instant ts, + TSTKM + tej+i - tdi is prior to the instant tsi + 2TSTKM- Therefore, the TEKj+1 key is not yet available at the end of the display of the start of the segment P,. Thus, the receiver again displays a black screen until the instant tSi + 2TSTKM- This second period of display of a black screen has the reference 12 in figure 2.
Starting from the instant tsi+2TSTKM, the receiver displays the end of the segment P, {period 14) in cleartext mode.
The appearance of a black screen during the period 12 after a period of cleartext display of the multimedia content is unpleasant to the user.
Naturally, one solution to prevent this phenomenon would be to await tSi+2TsT M before starting to display the segment P, in cleartext. However, this solution unacceptably increases the time needed to display the multimedia content in cleartext after a change of channels.
The invention seeks to overcome this drawback by proposing a method for sending a multimedia content in bursts, wherein the appearance of a black screen during the period 12 is eliminated.
An object of the invention therefore is a method for sending an enciphered multimedia content in bursts, wherein the replacement of a current key TEKj by the current key TEKj+i to encipher the segment P, is delayed up to a point in time tdi + TSTKM or brought forward to the instant tdi or before this instant tdi in response to a synchronization signal exchanged between the generator and the synchronizer, the duration TSTKM being greater than or equal to the time needed for a receiver to decipher the cryptogram of a current key contained in the burst S, and strictly smaller than the chosen duration T.
In the above method, the replacement of the key TEK, by the key TEKj+i is delayed or brought forward so as to prevent the end of the crypto-pehod from falling between the instants tdi and tdi+TsTKM- In other words, the duration T of the crypto-period T, is lengthened or shortened dynamically during the enciphering of the multimedia content so that the instant tej+i does not occur during the interval ]tdi ; tdi+TSTKM[ of a segment Pi. This means that the situation described with reference to figures 1 and 2 can no longer occur, thus preventing the appearance of a black screen during the period 12. Besides, this method can be used to resolve the problem whatever the duration chosen. In particular, it is not necessary to choose the duration T as being an integer multiple of the minimum duration of play TA of the segments considered.
The embodiments of this method can show one or more of the following characteristics: ■ the method comprises: - before the enciphering of a new segment Pit the comparing of a current instant tc established on the basis of the synchronization signal with a theoretical instant tte)+i of an end of the current crypto-period calculable from the instant tej and of the chosen duration T, the instant tej being the instant of a start of the current crypto-period, and - if the instant tc is prior to the instant ttej+i , the enciphering of the totality of the segment Pj with the current key TEKj even if the end of the crypto-period Tj occurs during the segment Ρ,, and - if the instant tc is later than the instant ttej+i , the enciphering of the totality of the segment P, with the new current key TEKj+1 ; n the method comprises: - before the enciphering of a new segment Pi during which there occurs an instant ttej+i of an end of the current crypto-period calculable from the instant tej of a start of the current crypto-period and of the chosen duration T, comparing the instant ttej+i with an interval ]tdj ; tdi + TSTKM[ established from the synchronization signal, and - only if the instant ttej+i is included in the interval ] ', tdi + TSTKM[, the replacing (140, 142) of the current key TEKj by the current key TEKj+i to encipher the segment P, is delayed until after an instant td, + TST M or brought forward to the instant or before the instant tdi.
These embodiments furthermore have the following advantages: - the comparing of the instants tc and ttej+i facilitates the implementing of the method for it is then not necessary to estimate the instant tdi+i of a start of the segment Pi+i ; - the activating of the replacing of the key TEKj by the key TEKj+i only if the instant ¾+ι is outside the slot ]tdl+i ; tdi+i + TSTK [ resolves the problem while at the same time enabling the replacing of the keys during a segment.
These embodiments moreover have the following advantages: - comparing the instants tc and ttej+i facilitates the implementation of the method because it is then not necessary to estimate the instant tdj+i of a start of the segment Ρ,+ι; - activating the replacing of the key TEKj by the key TEKj+ 1 only if the instant ttej+i is outside the interval ]tdi+1 ; tdi+i + TSTKM[ resolves the problem while at the same time making it possible to keys during a segment.
An object of the invention is also another method for sending an enciphered multimedia content in bursts, the method comprising: a) the choice of a duration T for successive crypto-periods, b) the immediately replacing of a current encipherment key TEKj by a new current key TEKj+i at each end of a crypto-period, c) the enciphering of immediately consecutive segments; P, of the multimedia content with the current enciphering key, each segment P, starting at a respective instant tdi and having a constant minimum duration of play TB, d) the building of a burst S,, the duration of reception of which is shorter than the duration of play of the segment Pj, the burst S, containing the enciphered segment P, and a cryptogram of each current key used to encipher the segment Pj wherein the duration of play of each segment is greater than or equal to a minimum duration TB common to all the segments.
Furthermore, in this method, the duration T is chosen to verify the following conditions: - Τ ΓΒ = r/q, where r and q are non-zero natural integers that are mutually prime numbers, and - 1 /q > TSTKM/TB where the duration TSTKM is greater than or equal to the time needed so that a receiver deciphers the cryptogram of a current key contained in the burst S, and strictly smaller than the chosen duration T.
In the above method, the duration T initially chosen is not any unspecified value. On the contrary, this duration T is chosen as being a rational number r/q verifying the two conditions set forth here above. When T verifies these two conditions, it ensures that the instant tej+i will never occur in the time slot ]tdi ; tdi + TSTKML Hence, in the above method, the duration T is constant and it is not necessary to lengthen or shorten it dynamically to prevent an instant tej+i from occurring in the slot ]td, ; tdi + TST M[ However, the freedom of choice of the duration T is restricted.
The embodiments of this method may have the following characteristic: - the duration of play of each segment Pj is equal to the duration TB. These embodiments facilitate the implementation of the method.
An object of the invention is also a carrier for the recording of information containing instructions for the execution of one of the above methods when these instructions are executed by an electronic computer.
An object of the invention is also a device for sending an enciphered multimedia content in bursts, the device comprising: a) a memory in which a duration T for successive crypt o-periods is recorded, b) a synchronizer capable of replacing an enciphering current key TEKj by a new current key TEKj+1 at each end of a crypto-perioti, c) a scrambler capable of enciphering immediately consecutive segments P, of the multimedia content with the current enciphering key, each segment P, starting at a respective instant tdi, d) a generator of a burst S, whose duration of reception is shorter than the duration of play of the segment P,, the burst S, containing the enciphered segment P, and a cryptogram of each current key used to encipher the segment P,.
Furthermore, the generator and the synchronizer are capable of exchanging a synchronization signal to delay the replacing of the current key TEKj by the current key TEKj+i until after the instant tdl + TSTKM or to bring this replacing forward to the instant or before the instant - Finally, an object of the invention is also another device for sending an enciphered multimedia content by bursts, the device comprising: a) a memory in which a duration T for successive crypto-periods is recorded, b) a synchronizer capable of immediately replacing an enciphering current key TEKj by a new current key TEKj+i at each end of a crypto- period, c) a scrambler capable of enciphering immediately consecutive segments P, of the multimedia content with the current enciphering key, each segment Pi starting at a respective instant tdi, and having a duration of play greater than or equal to a minimum duration TB common to all the segments, d) a generator of a burst S, whose duration of reception is shorter than the duration of play of the segment P,, the burst S, containing the enciphered segment Pi and a cryptogram of each current key used to encipher the segment Pi.
Furthermore, in this sender, the chosen duration T contained in the memory verifies the following conditions: - T/TB = r/q, where r and q are natural non-zero integers that are mutually prime numbers, and - 1/q≥Ts TB The embodiments of the sending device may comprise the following characteristic: - the sending device is capable of limiting the choice of the duration T to a duration T that meets both conditions.
The invention will be understood more clearly from the following description given purely by way of a non-exhaustive example and made with reference to the appended drawings, of which: - Figure 1 is a schematic illustration by means of timing diagrams of a particular synchronization between segments P, and a change of crypto-pe od, - Figure 2 is a timing diagram schematically illustrating a problem of the prior art, - Figure 3 is a schematic illustration of the architecture of a system for transmitting enciphered multimedia contents using device for sending by bursts, - Figure 4 is a flowchart of a method for sending a multimedia content by bursts by means of the sending device of figure 3, - Figure 5 is a timing diagram illustrating the synchronization of the segments P, with the changes of crypto-periods obtained by means of the method of figure 4, - Figures 6 and 7 are flowcharts of other embodiments of methods for sending an enciphered multimedia content by bursts.
In these figures, the same references are used to designate the same elements.
Here below in the description, characteristics and functions well known to those skilled in the art are not described in detail.
Figure 3 represents a system 20 for the transmission of multimedia contents in bursts. This system 20 comprises a sender 22 for sending a multimedia content in bursts to mobile receivers. To simplify the illustration, only three mobile receivers 24 to 26 have been shown. The mobile receivers 24 to 26 are linked to the sender device 22 by means of an information transmission network 28. The receivers 24 to 26 are linked to this network 28 by means of wireless links, respectively 30 to 32, so as to enable mobility.
Each receiver 24 to 26 is equipped with a screen 34 and at least one speaker 36 so that it can perceptibly and comprehensibly display the multimedia content received. For example, the receivers 24 to 26 are mobile telephones.
For example, the network 28 is a mobile telephony network.
The sender 22 comprises a port 40 through which is received the cleartext multimedia content to be sent out in enciphered form. This port 40 is connected to the input of a 42 for compressing the multimedia content. One output of the module 42 is connected to one input of a scrambler 44 capable of enciphering of compressed multimedia content. To this end, the scrambler 44 uses a current key TEKj contained in a memory 46. An output of the scrambler 44 is connected to an input of a generator of bursts 48. This generator 48 also has a buffer memory 49 in which there is registered a segment P, of the enciphered multimedia content as well as other different pieces of information to be transmitted in the form of a single burst. The other pieces of information incorporated in a burst comprise especially at least one STKMj message and possibly other pieces of information such as identifiers of burst, channels and the like. One output of the generator 48 is connected to an input of a broadcaster 50 capable of broadcasting the bursts generated by the generator 48 on the network 28.
The sending device 22 also has a generator 52 of keys capable of generating a new key TEKj for each new crypto-period. One output of this generator 52 is connected to one input of a synchronizer 54 and to one input of a builder 56 of STKMj messages. The builder 56 is capable of building the message STKMj containing a cryptogram of the key TEKj. One output of the builder 56 is connected to one input of the synchronizer 54.
The synchronizer 54 is capable of replacing the key TEKj currently registered in the memory 46 by a new key TEKj+i at the appropriate time.
The synchronizer 54 is also capable of sending the generator 48 the message STKMj corresponding to the key TEKj currently used by the scrambler 44 to encipher the current segment of the multimedia content.
In this embodiment, the generator 48 is also capable of sending a synchronization signal to the synchronizer 54. For example, this synchronization signal informs the synchronizer about the end of the preparation of a burst and the start of the preparation of the next burst.
For example, the sender 22 is made out of one or more programmable electronic computers capable of executing the instructions recorded on an information recording carrier. For example, the synchronizer 54 and the generator 48 are made out of respective electronic computers capable of working in parallel. To this end, here, the sender 22 is connected to a memory 60 containing instructions and the information needed to execute at least one of the sending methods described with reference to figures 4, 7 and 8.
The working of the sender 22 shall now be described in greater detail by means of the method of figure 4 and the timing diagram of figure 5.
Initially, before any sending of a multimedia content during a step 80, the duration T of the crypto-periods is chosen and then for example recorded in the memory 60. In this first embodiment, the duration T chosen may be any unspecified duration. In other words, there is no restriction on the choice of duration T except that it should be greater then TST M- Then, during the sending of an enciphered multimedia content, at a step 82, the generator 48 sends a synchronization signal to the synchronizer 54 to tell it that it must now start preparing a new burst. For example, the generator 48 sends this signals when it has finished generating the previous burst and before generating the next burst.
Then, at a step 86, the next burst to be broadcast is prepared. For example, in an operation 86, the module 42 compresses the current segment Pi of the multimedia content and then the scrambler 44 enciphers this compressed segment, using to this end the key currently recorded in this memory 46. As and when the segment is enciphered, it is recorded in the buffer memory 49.
Then, during an operation 90, when the quantity of information elements recorded in the memory 49 goes beyond a predefined threshold, the generator 48 starts the construction of the burst Sj containing the segment P,. In particular, at the operation 90, the generator 48 associates the following in one and the same burst: - the compressed and enciphered segment P,, - a burst identifier, - a message STKMj if the segment P, has been enciphered only by means of the key TEKj or two messages STKM, and STKMj+1 if the segment P, has been enciphered successively by means of the key TEKj and the key TEKj+1.
Once the preparation of the burst S, has been terminated, it is transmitted to the broadcaster 50 which, in a step 92, broadcasts it to all the receivers connected to the sender 22 by means of the network 28.
Then, the steps 82 to 92 are reiterated in a loop for each segment P, of the multimedia content to be broadcast.
In parallel with the steps 82 to 92, the synchronizer 54 manages the change of crypto-period. For example, at each start of a crypto-period Tj, in a step 100, the synchronizer 54 records the instant tej for starting this crypto-period.
Then, in a step 102, the generator 52 generates the key TEKj+i which must be used at the next crypto-period Tj+i . At the step 102, once the key TEKj+i has been generated, the builder 56 immediately builds the message STK j+i containing a cryptogram TEKj+i* of the key TEKj+i . The key TEK,,-i and the message STKMJ+i are transmitted to the synchronizer 54.
Then, the generator 48 sends the synchronization signal to the synchronizer 54. In response, the synchronizer 54 immediately carries out a step 104 for computing a difference At. The difference At is computed by means of the following relationship: At = tc - tej, where the instant tc is the current instant of the content, i.e. the cumulated duration of play of the segments or parts of segments of the content that are already enciphered, at the time when the synchronizer 54 receives the synchronization signal sent by the generator 48.
Then, at a step 106, the synchronizer 54 compares the difference At with the chosen duration T of the crypto-periods. This step is a particular embodiment of a comparison between the current instant tc and a theoretical instant ttej+i of an end of the current crypto-period Tj that can be computed starting from an instant tej of a start of the crypto-period Tj and the chosen duration T.
If the difference At is strictly smaller than the duration T, it means that the end of the crypto-period has not yet been reached. In this case, at a step 108, the synchronizer 54 inhibits any replacement of the key TEKj recorded in the memory 46 up to the next indication of the generator 48 according to which the preparation of a new burst will soon begin. By operating this way, the synchronizer 54 prevents any replacement of the key recorded in the memory 46 during the encipherment of a segment. Thus, the synchronizer 54 ensures that no change of a key TEKj can occur during the encipherment of a segment Pj. This can therefore lead to extending the duration of the crypto-period Tj if necessary.
At the end of the step 108, the method returns to a state of waiting for a new synchronization message from the generator 48.
If not, i.e. if the difference At is greater than or equal to the duration T, it means that the crypto-period Tj us coming to an end or has almost come to an end. In this case, in a step 110, the synchronizer 54 replaces the key TEKj in the memory 46 by the key TEKj+i before the start of encipherment of the segment Pi+i . At the step 1 0, the synchronizer 54 also transmits the message STKMj+i o the generator 48.
Then, at a step 1 12, the synchronizer 54 inhibits every new change of the key recorded in the memory 46 until the next synchronization signal. At the end of the step 1 12, the method returns to the step 100 so as to memorise the instant tej+i at which the synchronizer 54 had replaced the key in the memory 46 as a new instant of start of the current crypto-period Tj+1 .
The timing diagram of figure 5 makes it possible to understand the behavior and consequences of the method of figure 4 in greater detail. Figure 5 shows a time axis 120 on which the instants td, of the starting of each of the segments P, have been represented. In a content played at normal speed on a receiver, the segments P, are immediately consecutive so that the instant of the end of the playing of a segment corresponds to the instant of the start of the playing of the next segment. It will be noted that this is not necessarily the case on the sender side so that the encipherments of consecutive segments can be separated by a sufficiently lengthy time slot, for example, to enable the replacing of the encipherment key in the memory 46. The scrambler 44 can also be capable, at least for a certain period of time, of enciphering two multimedia content channels in parallel with, respectively, the keys TEKj and TEKJ+ . In this case, the current key is replaced by sending the same multimedia content on these two channels and then by switching over from one channel to the other to pass instantaneously from the crypto-period Tj to the crypto-period Tj+ without interrupting the stream of multimedia content. Other approaches are again possible.
On another time axis 122 plotted to the same scale, the instant j+i and a theoretical instant ttej+ of the end of the crypto-period Tj have been shown.
The instant ttej+i corresponds to the theoretical instant of an end of the crypto-period Tj computed by adding to the instant tej of the start of the crypto-period Tj the duration T chosen during the step 80.
Finally, instants tCi and tc2 represented on the axis 120 correspond to two successive current instants at which the generator 48 sends the synchronization signal to the synchronizer 54. For the readability of the figures, the instants tCi and tC2 are represented as being prior respectively to the instants tdi and tdi+i.
In figure 5, the instant tci is prior to the instant ttej+i . In this context, at the step 106, the synchronizer 54 determines the fact that the difference At is strictly smaller than the duration T. It therefore prevents any new change of key in the memory 46 until the next instant tc2- The instant tC2 is after the instant ttej+i. Thus, the synchronizer 54 determines the fact that the difference At is strictly greater than the duration T. It therefore replaces the key TEKj by the key TEKj+i at the end of the enciphering of the segment P, and before the start of the enciphering of the segment P,+1.
It will therefore be understood that the next segment, i.e. the sesgment Pi+i is entirely enciphered through the use of the key TEKj+1. It can also be observed that while a replacing of the key TEKj should have occurred during the segment Pi, this replacing has actually occurred only at the end of the segment P,. This corresponds to a lengthening of the duration of the crypto-period Tj. This lengthening of the duration of the crypto-period Tj is activated in response to a synchronization signal. More specifically, here, this lengthening of the duration of the crypto-period Tj is activated only if the instant ttej+1 occurs during a segment. If not, the duration of the crypto-period is equal to the chosen duration T. Acting in this way ensures that, whatever the duration T chosen, no replacing of a key TEKj can occur in the interval ]tdi ; tdi + Τ5ΤΚΜ[· Figure 5 represents a time axis 124 plotted to the same scale on which the instants tsi for starting the reception of the bursts Sj are shown.
Figure 6 represents another embodiment of a method of sending an enciphered multimedia content in bursts. Initially, before the transmission of the multimedia content, at a step 130, an unspecified duration T is chosen for the crypto-period s.
Then, the steps 82 to 92 are repeated in a loop to transmit the multimedia content in bursts. At the same time, the synchronizer 54 manages the replacing off the key stored in the memory 46 by a new key. For example, in a step 132, the synchronizer 54 records the instant tej at which the current crypto-period Tj has begun. At the step 132, the synchronizer 54 also computes the instant ttej+i at which the end of the current crypto-period T has occurred. For this computation, the synchronizer uses for example the instant tej as well as the duration T chosen at the step 130.
Then, after each start of a crypto-period, in a step 134, the generator 52 and the builder 56 respectively give the key TEKJ+1 and the message STKMj+1.
In parallel with the step 134, at a step 136, whenever the generator 48 sends the synchronizer 54 the synchronization signal, the synchronizer 54 sets up an instant t^ at which the next segment contained in the burst that will be prepared must start. For example, the synchronization signal is sent at each instant td, of the start of a segment Pi. Thus, here the synchronization signal indicates the start of each segment.
Then, the synchronizer 54 proceeds to a step 138 in which it makes a check to see if the following condition is fulfilled: I tdi - ttej+i I > TSTKM where tdi is the starting instant recorded at the step 136.
The step 138 therefore consists in comparing the instant tt^+i with an interval ]tdi ; tdi + TSTKM[ set up from the synchronization signal onwards.
Should this condition be fulfilled, the synchronizer 54 immediately performs the step 140 for replacing the key TEK by the new key TEKj+i without waiting for the encipherment of the end of the current segment P,.
If not, the synchronizer 54, at a step 142, delays the replacing of the key TEKj. For example, at the step 142, the synchronizer 54 introduces a delay strictly greater than tdi + TSTKM - ttej+i . After having introduced this delay at the step 142, the synchronizer proceeds to the step 140. At the end of the step 140, the method returns to the step 132.
Thus, in this method, unlike in the method of figure 4, a change of crypto-period can take place during a segment. However, the synchronizer 54 is capable of extending the duration of the crypto-period Tj if the instant ttej+i occurs in the interval ]tdj ; tdi + TST M[- Figure 7 also illustrates another possible embodiment of the method. Before the start of the sending of the multimedia content, at a step 150, the duration T of the crypto-period is chosen to verify the following relationships: T/TB = r/q, and 1 q≥TSTKM TB where : - r and q are natural non-zero integers that are mutually prime numbers, and - TB is a minimum duration that is smaller than or equal to the smallest duration of play of a segment of the multimedia content.
The duration TB is therefore a minorant, independent of the index i, which reduces the duration of all the segments P, of the multimedia content. It is assumed here that the duration of play of each segment P, is equal to the durationTB. The duration TB is greater than TSTKM .
Such a choice of the duration T ensures that no change in crypto-period can occur in the interval ]tdi ; tdi + TSTKM[.
For example, at the step 150, the sender 22 limits the choice of the duration T solely to the durations complying with the above relationships. For example, at the step 150, a graphic interface enabling only one operator to choose a duration T verifying these relationships is presented to an operator of this sender 22. The graphic interface is then generated by the synchronizer 54.
Then, at the sending of the multimedia content, each burst is prepared during a step 52. The step 152 is identical for example to the step 86.
Then, once the burst has been prepared, it is broadcast in a step 154 identical for example to the step 92.
The steps 152 and 154 are reiterated in a loop to transmit the multimedia content in bursts.
At the same time, at a step 156, at each start of a crypto-period, the generator 52 and the builder 56 respectively give the new key TEKj+i and the new message STKMj+i .
Then, as soon as the instant ttej+i occurs, at a step 158, the synchronizer 54 immediately replaces the key TEKj with the key TEKj+i in the memory 46. At the step 158, the synchronizer 54 also sends the generator 48 the new message STKMj+i corresponding to the key ΤΕΚ,+Ί .
The steps 156 and 158 are reiterated in a loop. In this methcd, through the particular choice of the duration T, it is no longer necessary for the generator 48 to inform the synchronizer 54 of the start of the preparation of a new burst. Furthermore, here by means of the method of figure 7, the synchronizer 54 no longer has the function of lengthening or on the contrary of shortening the duration of a crypto-period. On the contrary, in this embodiment, the duration T of the crypto-period is constant. In other words, in this embodiment the synchronizer 54 is used solely to: - limit the choice of the duration T, and - replace keys in the memory 46 and at the same time transmit the new messages STKMj to the generator 48.
Many other embodiments are possible. For example, the cryptogram of the key TEKj contained in the message STKMj may be a reference to an enciphered key pre-recorded in the memory of the receiver. More generally, the term "cryptogram of the key TEKj" herein designates all the information needed but insufficient in itself to rebuild the key TEKj.
The generator 48 and the synchronizer 54 may be obtained by means of electronic circuits specially wired to fulfil the requisite functions. Thus, these circuits do not necessarily have recourse to instructions recorded on an information recording carrier.
In another embodiment, to resolve the problem described with reference to figures 1 and 2, it is also possible to modify the receivers so that each receiver is capable of the parallel processing of two messages STKMj and STKMj+1 . Thus, at the end of a duration TSTK , these receivers h;ave at their disposal both the key TEKj and the key TEKj+i . By thus modifying the receivers, the reappearance of a black screen during the period 12 can be averted.
When the duration of play TB is known and constant, it is also possible to know in advance, by computation, if the instant ttej+1 of starting the next crypto-period Tj+i must occur in the interval ]tdi ; tdi + TSTKM[- If this computation is done sufficiently in advance, then it is possible to shorten the duration of the current crypto-period Tj to activate the replacing of the key in the memory 46 not during this interval but before the instant tdi. In this case, the duration of the crypto-period Tj is shortened.
When the replacing of the key TEKj by the key TEKj+i is brought forward or delayed, this replacing will be brought forward or delayed so as not to take place in the interval ]tdi ; tdi + TSTK [ of a preceding or following segment.
At the step 150, it is not necessary for the sender device 22 to limit the possible choices of this duration T. The storage in the transmitter of a satisfactory duration T is then done solely under the operator's control.
As a variant, the duration T is chosen as being an integer multiple of the duration TB. In this case initially the instants of starting the first crypto-period and the first segment are synchronizatd so that the end of a crypto-period never occurs in the interval ]tdi ; tdi + TSTK [ of a segment. In this way, the duration of the crypto-periods is constant.

Claims (1)

  1. CLAIMS Method for sending an enciphered multimedia content in bursts, this method comprising: a) the choice (80) of any duration T for successive crypto-periods, b) the replacing (1 10; 140), by means of a synchronizer, oF a current encipherment key TEKj by a new current key TEKj+i at each end of a crypto-period, c) the encipherment (88) of immediately consecutive segments Pi of the multimedia content with the current enciphering key, each segment P, starting at a respective instant ten, d) the building (90), by means of a generator, of a burst S, for which the duration of reception is shorter than the duration of play of the segment Pi, the burst S, containing the enciphered segment P, and a cryptogram of each current key used to encipher the segment Pi characterized in that the replacing (1 10; 140) of the current key TEKj by the current key TEKj+i to encipher the segment P, is delayed until after an instant td, + TSTKM brought forward to the instant tdl or before the instant tdi. in response to a synchronization signal exchanged (82) between the generator and the synchronizer, the duration TSTK being greater than or equal to the time needed for a receiver to decipher the cryptogram of a current key contained in the burst S, and strictly smaller than the duration T chosen. Method according to claim 1 , wherein the method comprises: - before the enciphering of a new segment ,, the comparing (106) of a current instant tc, established on the basis of the synchronization signal, with a theoretical instant ttej+i of an end of the current crypto-period calculable from the instant \ and of the chosen duration T, the instant tej being the instant of a start of the current crypto-period, and - if the instant tc is prior to the instant ttej+i , the enciphering (88, 108) of the totality of the segment P, with the current key TEKj even if the end of the crypto-period Tj occurs during the segment P,, and - if the instant tc is later than the instant ttej+i, the enciphering (88, 08) of the totality of the segment P, with the new current key TEKj+1 ; Method according to claim 1 , wherein the method comprises : - before the enciphering of a new segment P, during which there occurs a theoretical instant ttej+i of an end of the current crypto-period calculable from the instant tej of a start of the current crypto-period and of the chosen duration T, the comparing of the instant ttej+i with an interval ] \ ; tdi + TSTKM[ established from the synchronization signal, and - only if the instant ttej+i is included in the interval ]tdl ; tdi + TSTKM[, the replacing (140, 142) of the current key TEKj by the current key TEKj+i to encipher the segment P, is delayed until after an instant tdi + TSTKM or brought forward to the instant or before the instant tdi. 4. Method for sending an enciphered multimedia content in bursts, this method comprising: a) the choice (150) of a duration T for successive crypto-periods, b) the immediately replacing (158) of a current encipherment key TEKj by a new current key TEKj+i at each end of a crypto-period, c) the immediate enciphering (88) of consecutive segments P, of the multimedia content with the current enciphering key, each segment P, starting at a respective instant tdi and having a duration of play greater than or equal to a minimum duration TB common to all the segments, d) the building (90) of a burst S, for which the duration of reception is shorter than the duration of play of the segment P,, the burst Sj containing the enciphered segment P, and a cryptogram of each current key used to encipher the segment P,. characterized in that the chosen duration T verifies the following conditions: - TTTB = r/q, where r and q are non-zero natural integers that are mutually prime numbers, and - /q > TSTK / B where the duration TSTKM is greater than or equal to the time needed for a receiver to decipher the cryptogram of a current key contained in the burst S and strictly smaller than the chosen duration T. 5. Method according to ciaim 4, wherein the duration of play of each segment P, is equal to the duration TB. 6. Information-recording carrier, characterized in that it comprises instructions for the execution of a method according to any one of the above claims when these instructions are executed by an electronic computer. 7. Sender of a an enciphered multimedia content in bursts, this sender comprising: a) a memory (60) in which a duration T for successive crypto-periods is recorded, b) a synchronizer (54) capable of replacing an enciphering current key TEKj by a new current key TEKj+i at each end of a crypto-period, c) a scrambler (44) capable of enciphering immediately consecutive segments P, of the multimedia content with the current enciphering key, each segment P, starting at a respective instant tdi, d) a generator (48) of a burst S, whose duration of reception is shorter than the duration of play of the segment Pi, the burst S, containing the enciphered segment Pi and a cryptogram of each current key used to encipher the segment P,. 5 characterized in that the generator (48) and the synchronizer (54) are capable of exchanging a synchronization signal to delay the replacing of the current key TEKj by the current key TEKj+i until after the instant tdi + TSTKM or to bring this replacing forward to the instant tdi or before the instant tdi, the duration TSTKM being greater than or equal to the time needed for a receiver I 0 to decipher the cryptogram of a current key contained in the burst S, and strictly smaller than the chosen duration T. 8. Sender of a an enciphered multimedia content in bursts, this sender comprising: 15 a) a memory (60) in which a duration T for successive crypto -periods is recorded, b) a synchronizer (54) capable of immediately replacing an enciphering current key TEKj by a new current key TEKj+i at each end of a crypto-period, c) a scrambler (44) capable of enciphering immediately consecutive 0 segments P, of the multimedia content with the current enciphering key, each segment Pj starting at a respective instant tdil and having a duration of play greater than or equal to a minimum duration TB common to all the segments, d) a generator (48) of a burst S, whose duration of reception is shorter than the duration of play of the segment Pj, the burst S, containing the enciphered 5 segment Pj and a cryptogram of each current key used to encipher the segment Pj. characterized in that the chosen duration T contained in the memory verifies the following conditions: - TVTB = r/q, where r and q are natural non-zero integers that are mutually 0 prime numbers, and - 1/q≥TSTKM/TB where the duration TSTKM is greater than or eq ual to the time needed for a receiver to decipher the cryptogram of a current key contained in the burst S, and strictly smaller than the chosen duration T. 9. Sender according to claim 8, wherein the sender is capable of limiting the 5 choice of the duration T to a duration T that meets both conditions. O & LUZZATTO
IL209263A 2008-05-30 2010-11-11 Methods and devices for sending an enciphered multimedia content in bursts and recording carrier for these methods IL209263A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0802970A FR2932042B1 (en) 2008-05-30 2008-05-30 METHODS AND SALVES EMITTERS OF DIGITAL MULTIMEDIA CONTENT, RECORDING MEDIUM FOR SUCH METHODS.
PCT/EP2009/055324 WO2009144111A1 (en) 2008-05-30 2009-05-04 Methods and burst-transmitters of a piece of encrypted multimedia content, and storage medium for said methods

Publications (2)

Publication Number Publication Date
IL209263A0 IL209263A0 (en) 2011-01-31
IL209263A true IL209263A (en) 2014-09-30

Family

ID=40119336

Family Applications (1)

Application Number Title Priority Date Filing Date
IL209263A IL209263A (en) 2008-05-30 2010-11-11 Methods and devices for sending an enciphered multimedia content in bursts and recording carrier for these methods

Country Status (8)

Country Link
EP (1) EP2297950B1 (en)
ES (1) ES2558959T3 (en)
FR (1) FR2932042B1 (en)
IL (1) IL209263A (en)
PL (1) PL2297950T3 (en)
RU (1) RU2496140C2 (en)
TW (1) TWI388214B (en)
WO (1) WO2009144111A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2797335A1 (en) 2013-04-26 2014-10-29 Nagravision S.A. Method to watermark a compressed content encrypted by at least one content key
EP2797333A1 (en) * 2013-04-26 2014-10-29 Nagravision S.A. Method for watermarking media content and system for implementing this method
EP2797334A1 (en) 2013-04-26 2014-10-29 Nagravision S.A. Method and device to embed watermark in uncompressed video data
CN113518244B (en) * 2021-09-15 2021-11-12 深圳佳力拓科技有限公司 Digital television signal data transmission method and device based on substitute text combination

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100671188B1 (en) * 1998-05-08 2007-01-18 퀄컴 인코포레이티드 Apparatus and method for distribution of high quality image and audio programs to remote locations
US20040083177A1 (en) * 2002-10-29 2004-04-29 General Instrument Corporation Method and apparatus for pre-encrypting VOD material with a changing cryptographic key
WO2006111949A2 (en) * 2005-04-19 2006-10-26 Nds Limited Security scheme for mobile devices
EP1742473A1 (en) * 2005-07-06 2007-01-10 Nagra France Sarl Method for transmitting a digital data stream and control meessages associated with the data stream to mobile devices

Also Published As

Publication number Publication date
RU2496140C2 (en) 2013-10-20
FR2932042B1 (en) 2010-05-07
WO2009144111A1 (en) 2009-12-03
FR2932042A1 (en) 2009-12-04
TWI388214B (en) 2013-03-01
PL2297950T3 (en) 2016-04-29
IL209263A0 (en) 2011-01-31
RU2010154166A (en) 2012-07-10
EP2297950A1 (en) 2011-03-23
ES2558959T3 (en) 2016-02-09
EP2297950B1 (en) 2015-11-04
TW200950520A (en) 2009-12-01

Similar Documents

Publication Publication Date Title
JP4905603B2 (en) Reception device, reception method, transmission / reception system, and transmission / reception method
US8260275B2 (en) Data transmitting apparatus and method
WO2006120516A2 (en) Fine grain rights management of streaming content
US8228441B2 (en) Apparatus and method for receiving digital multimedia broadcasting without image discontinuity during channel switching
IL209263A (en) Methods and devices for sending an enciphered multimedia content in bursts and recording carrier for these methods
JP2002165188A (en) Contents delivery method, contents data recording/ reproducing method and apparatus
CN1672412A (en) Storage of encrypted digital signals
CN103281572B (en) The DVB conditional receiving device of integrated master data, normal data descrambling
US7287160B2 (en) Recording medium, reproducing device, and recording/reproducing device
US7480383B2 (en) Apparatus and method for scrambling high-rate data
EP2668776B1 (en) Cascading dynamic crypto periods
EP1631077B1 (en) Digital multimedia broadcast receiving apparatus and method thereof
JP2011244268A (en) Broadcast apparatus, broadcast receiver, broadcast method, and broadcast reception method
Angebaud et al. Conditional access mechanisms for all-digital broadcast signals
JP6695465B2 (en) Display device
JP4766028B2 (en) Receiving apparatus and receiving method
JPH11225321A (en) Transmitter and receiver in restricted receiving system
JP4049175B2 (en) Transmitting apparatus and transmitting method
IL208922A (en) Methods for receiving and sending a multimedia content, receiver, sender and recording carrier and security processor for this method
US20050232418A1 (en) Method of distributing encrypted portions of an audiovisual programme
JP2017046236A (en) Content transmission system, transmitter, receiver, transmission method, reception method and program
KR20050021555A (en) Method of distributing encrypted portions of an audiovisual programme

Legal Events

Date Code Title Description
FF Patent granted
KB Patent renewed
KB Patent renewed
MM9K Patent not in force due to non-payment of renewal fees