Processing

Please wait...

Settings

Settings

Goto Application

1. WO2014117851 - PROXY MODULES

Publication Number WO/2014/117851
Publication Date 07.08.2014
International Application No. PCT/EP2013/051963
International Filing Date 31.01.2013
IPC
H04H 60/23 2008.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
HBROADCAST COMMUNICATION
60Arrangements for broadcast applications with a direct linkage to broadcast information or to broadcast space-time; Broadcast-related systems
09Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
14Arrangements for conditional access to broadcast information or to broadcast-related services
23using cryptography, e.g. encryption, authentication or key distribution
H04N 21/266 2011.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
21Selective content distribution, e.g. interactive television or video on demand
20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication or learning user preferences for recommending movies
266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
H04N 21/4623 2011.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
21Selective content distribution, e.g. interactive television or video on demand
40Client devices specifically adapted for the reception of, or interaction with, content, e.g. STB ; Operations thereof
45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
462Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
4623Processing of entitlement messages, e.g. ECM  or EMM
CPC
H04H 60/23
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
HBROADCAST COMMUNICATION
60Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
09Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
14Arrangements for conditional access to broadcast information or to broadcast-related services
23using cryptography, e.g. encryption, authentication, key distribution
H04N 21/26606
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
21Selective content distribution, e.g. interactive television or video on demand [VOD]
20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
26606for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
H04N 21/4623
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
21Selective content distribution, e.g. interactive television or video on demand [VOD]
40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
4623Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
Applicants
  • IRDETO B.V. [NL]/[NL]
Inventors
  • WESTERVELD, Egbert
  • DEKKER, Hans
Agents
  • PELLY, Joanna
Priority Data
Publication Language English (en)
Filing Language English (EN)
Designated States
Title
(EN) PROXY MODULES
(FR) MODULES PROXY
Abstract
(EN) There is described a proxy module for use in a head-end. The head-end comprises an entitlement control message (ECM) generator arranged to generate ECMs. The head-end further comprises an encryption module arranged to encrypt content using a control word. The proxy module is arranged to: access a content control word; use the ECM generator to generate a content ECM including the content control word; generate a supplementary control word; use the ECM generator to generate a supplementary ECM including the supplementary control word; use the encryption module to encrypt the content ECM using the supplementary control word; and use the encryption module to encrypt content using the content control word. A corresponding method of providing encrypted content is also provided. There is also described a proxy module for use in a receiver arranged to receive entitlement control messages (ECMs) and encrypted content. The receiver comprises a secured module arranged to process an ECM so as to provide a control word. The receiver further comprises a decryption module arranged to decrypt encrypted content using a control word. The proxy module is arranged to: use the secured module to obtain a supplementary control word from a supplementary ECM; use the supplementary control word in the decryption module to obtain a content ECM from an encrypted version of the content ECM; use the secured module to obtain a content control word from the content ECM; and use the content control word in the decryption module to decrypt encrypted content. A corresponding method of enabling a receiver to access encrypted content is also provided.
(FR) La présente invention se rapporte à un module proxy devant être utilisé dans une tête de réseau. La tête de réseau comprend un générateur de messages de commande des autorisations (ECM) qui est configuré de façon à générer des ECM. La tête de réseau comprend par ailleurs un module de chiffrement qui est configuré de façon à chiffrer un contenu au moyen d'un mot de contrôle. Le module proxy est configuré de façon : à accéder à un mot de contrôle de contenu ; à utiliser le générateur d'ECM pour générer un ECM de contenu comprenant le mot de contrôle de contenu ; à générer un mot de contrôle supplémentaire ; à utiliser le générateur d'ECM pour générer un ECM supplémentaire comprenant le mot de contrôle supplémentaire ; à utiliser le module de chiffrement pour chiffrer l'ECM de contenu au moyen du mot de contrôle supplémentaire ; et à utiliser le module de chiffrement pour chiffrer un contenu au moyen du mot de contrôle de contenu. La présente invention se rapporte d'autre part à un procédé correspondant pour la fourniture d'un contenu chiffré. L'invention se rapporte par ailleurs à un module proxy devant être utilisé dans un récepteur. Le récepteur est configuré de façon à recevoir des messages de commande des autorisations (ECM) ainsi qu'un contenu chiffré. Le récepteur comprend un module de sécurité qui est configuré de façon à traiter un ECM de sorte à fournir un mot de contrôle. Le récepteur comprend par ailleurs un module de déchiffrement qui est configuré de façon à déchiffrer un contenu chiffré au moyen d'un mot de contrôle. Le module proxy est configuré de façon : à utiliser le module de sécurité pour obtenir un mot de contrôle supplémentaire à partir d'un ECM supplémentaire ; à utiliser le mot de contrôle supplémentaire dans le module de déchiffrement pour obtenir un ECM de contenu à partir d'une version chiffrée de l'ECM de contenu ; à utiliser le module de sécurité pour obtenir un mot de contrôle de contenu à partir de l'ECM de contenu ; et à utiliser le mot de contrôle de contenu dans le module de déchiffrement pour déchiffrer un contenu chiffré. La présente invention se rapporte d'autre part à un procédé correspondant adapté pour permettre à un récepteur d'accéder à un contenu chiffré.
Latest bibliographic data on file with the International Bureau