RussianPatents.com

Conventional access system for digital television and method for its use

Conventional access system for digital television and method for its use
IPC classes for russian patent Conventional access system for digital television and method for its use (RU 2477923):
Another patents in same IPC classes:
Method for synchronising in multi-level communication network, communication network and network node Method for synchronising in multi-level communication network, communication network and network node / 2477921
In synchronising method communication organisation is made in several hierarchically organised levels with synchronising the nodes of lower level to higher level; subordinate node can have nodes subordinate to it, for which it is superior: each communication centre has its assigned time interval for receiving and transmitting; the exchange between superior and subordinate nodes is made in repeatable frame, during which there performed is the exchange with all subordinate nodes: time intervals of transmitting and receiving are preliminary distributed in frames of each network level. Multi-level communication network has several hierarchically organised levels with synchronising the nodes of lower level to higher level; subordinate node has nodes subordinate to it, for which it is superior. Network node has physical interface device, medium access device, interface device that consists of n (n≥1) interfaces that are connected to n terminating devices correspondingly.
System and method for efficient transmission of content packets to electronic devices System and method for efficient transmission of content packets to electronic devices / 2477892
System for supporting a packet transmission procedure includes a packet manager which divides the selected content entity into individual content segments. A transmitter then transmits content segments essentially simultaneously over different corresponding transmission channels. One or more electronic devices receive and store the transmitted content segments. The content manager of the electronic device performs a reassembly procedure in order to convert content segments into the initially transmitted content entity for use by the device user.
Preventing misuse of random access procedure in wireless communication system Preventing misuse of random access procedure in wireless communication system / 2477587
Invention is based on transmitting a random access preamble, receiving a random access response message which includes a random access response which is scrambled using a random access preamble identifier transmitted by a mobile station, checking that the random access response is in response to the random access preamble transmitted by the mobile station, and decoding the random access response.
Method of selecting radio resource, mobile station and base station Method of selecting radio resource, mobile station and base station / 2477586
Steps of a mobile communication method are executed: (A) transmitting, from a radio base station (eNB) to a mobile station (UE), a cycle value and information on the uplink radio resource; and (B) determining, at the mobile station (UE), the allocation starting time, receiving downlink data via a downlink radio resource and transmitting acknowledgement information via an uplink radio resource at and after the first allocation starting time, when receiving a fixed allocation signal from the radio base station (UE). At step (B), the uplink radio resource is adjusted by an adjustment signal included in the fixed allocation signal and the acknowledgement information is transmitted via the adjusted uplink radio resource.
Network-initiated area event triggered positioning method for roaming terminal in mobile communication system Network-initiated area event triggered positioning method for roaming terminal in mobile communication system / 2477585
Network-initiation of area-based positioning of a roaming terminal is discriminated according to a proxy mode and a non-proxy mode, and area-based positioning for the roaming terminal is performed through various methods according to whether the secure user plane (SUPL) location platform (SLP) for performing the positioning procedure with respect to the allocated mode, the visited SLP (V-SLP) or the home SLP (H-SLP).
Network-initiated area event triggered positioning method for roaming terminal in mobile communication system Network-initiated area event triggered positioning method for roaming terminal in mobile communication system / 2477585
Network-initiation of area-based positioning of a roaming terminal is discriminated according to a proxy mode and a non-proxy mode, and area-based positioning for the roaming terminal is performed through various methods according to whether the secure user plane (SUPL) location platform (SLP) for performing the positioning procedure with respect to the allocated mode, the visited SLP (V-SLP) or the home SLP (H-SLP).
Locating emergency calls via femto access points Locating emergency calls via femto access points / 2477584
Emergency call may be routed to an emergency centre based on location information for the femto access point (FAP) which includes a macro cell identifier (ID) and/or a macro cell Mobile Switching Centre (MSC) ID determined based on the FAP location. The location information for the FAP may include a location estimate for the FAP. The location estimate may be used to access a geographic database which stores routing information for emergency centres for different geographic areas.
Connection maintenance in ieee 802,16 networks with relays via cid encapsulation Connection maintenance in ieee 802,16 networks with relays via cid encapsulation / 2477583
Disclosed is a method of transmitting data in a wireless network which involves generating a packet of data having a connection identification (CID) indicating a connection to a final destination for the packet of data. The desired route for transmitting the packet of data to the final destination is determined, said route including one or more relay stations. The generated packet of data is encapsulated in one or more capsules, each capsule having a CID indicating a connection to one or more relay stations along the desired route. The packet of data is sent along the desired route using multiple CIDs of the one or more capsules and the packet of data so as to arrive at the final destination. At each of the one or more relay stations, an outermost capsule having a CID corresponding to the present relay station is stripped from the packet of data.
Method for reselecting cell with different radio access technologies Method for reselecting cell with different radio access technologies / 2477582
Disclosed is a method for performing cell reselection, wherein the selection quality factor of the current cell is determined first. The cell selection quality factor is compared with a predetermined threshold. Neighbouring cells are measured if the cell selection quality factor is less than or equal to the predetermined threshold. Intra-frequency cells, inter-frequency cells or cells with different radio access technologies can be measured. If a neighbouring cell which is better than the current cell based on the measurements is detected, the best neighbouring cell is reselected.
Method for reselecting cell with different radio access technologies Method for reselecting cell with different radio access technologies / 2477582
Disclosed is a method for performing cell reselection, wherein the selection quality factor of the current cell is determined first. The cell selection quality factor is compared with a predetermined threshold. Neighbouring cells are measured if the cell selection quality factor is less than or equal to the predetermined threshold. Intra-frequency cells, inter-frequency cells or cells with different radio access technologies can be measured. If a neighbouring cell which is better than the current cell based on the measurements is detected, the best neighbouring cell is reselected.
Programmable multimedia controller with programmable functions Programmable multimedia controller with programmable functions / 2460119
Disclosed is an integrated system which is based on a general purpose computer and is capable of interfacing with, controlling or managing a wide variety of audio, video, communication, data transmission or other devices. The system includes a programming environment for creating functions or user experiences that may incorporate features or functionalities of several devices that are conventionally used as separate, standalone devices.
Method of multimedia data protection Method of multimedia data protection / 2449494
Method of data transmission to client computer executing client program includes following steps: a) data transmission to client program, b) transmission of program code containing algorithm from protection server to client program where algorithm result is function of client program status, c) executing the mentioned code by client program and returning result to protection server and facilities connected with protection server, and d) determination by protection server or facilities connected with protection server whether the obtained result indicates absence of client program modification.
Device for processing data elements which can be reproduced to user Device for processing data elements which can be reproduced to user / 2446614
Device (DVR) is processing data elements which can be reproduced for user. Example of such device is digital videorecorder. The device (DVR) contains network interface (NWIC, NWIM) which connects the device (DVR) to network which contains other devices. Content analysis initiator (ECF) in the device (DVR) detects that other device comprising part of network contains content analyser. Content analysis initiator (ECF) applies content analyser (AVCA) of other device to data element (AVF).
Content download system, content download method, content supplying apparatus, content supplying method, content receiving apparatus, content receiving method, and programme Content download system, content download method, content supplying apparatus, content supplying method, content receiving apparatus, content receiving method, and programme / 2432686
Disclosed is a content download system comprises: a content supplying device, a content receiving device, a download apparatus designed to download encrypted content and playing control data necessary for playing said content from said content supplying device according to user operations; obtaining apparatus to confirm the existence of a license which includes a key for decrypting said encrypted content based on said playing control data when playing said downloaded content, and to obtain said license according to the confirmation result; and playing apparatus to play said encrypted content using said obtained license. Playing control metafile describes <content_title>, <drm_server_uri>, <license_id>, <license_type>, <license_description>, <user_confirmation>, <user_messsage>, and <price>. In the case when multiple licenses are set for a single content, the items <license_id> through <price> describe only the number of set licenses.
Method to grant license to client device corresponding to coded content and system of conversion to manage digital rights, applying this method Method to grant license to client device corresponding to coded content and system of conversion to manage digital rights, applying this method / 2421806
Method of a conversion system operation to manage digital rights to grant a license to a client's device corresponding to coded content consists in the following. The first content of the first type of digital rights content and the first license corresponding to the first content are converted to manage digital rights in order to generate the second content of the second type of digital rights content and the second license corresponding to the second content. A license request is received, corresponding to the second content distributed by means of superdistribution to a third party. The second license corresponding to the second content distributed by means of superdistribution is requested from a server corresponding to the second management of digital rights. The second license corresponding to the second content distributed by means of superdistribution is received and sent to a third party.
Method and device for processing dvb-h (digital video broadcasting - handheld) compliant transport stream Method and device for processing dvb-h (digital video broadcasting - handheld) compliant transport stream / 2418367
Invention proposes a method for processing a transport stream (TS) received as an input TS in a processing device (SDR), the transport stream comprising a plurality of elementary streams (ES), each ES being a set of TS packets having the same Packet IDentifier (PID), at least one of these ES being time-sliced so as to be sent in bursts, timing information indicating within a burst the time to the beginning of the next burst, applying a filtering operation to the input TS so as to filter out from the input TS part or all of one or more time- sliced ES; modifying the bursts scheduling of the input transport stream so as to generate a DVB-H compliant output TS from the filtered input TS.
Controlled communication system Controlled communication system / 2417534
First user can support one or more content "portals", which can be accessed by at least a subset of members of an online community. Access to content of any portal can be based on the level of confidentiality of the portal and the level of confidentiality, for example, access parametres provided to a person. The level of confidentiality and linking the content can be hierarchical and/or non-overlapping. That way, a user can transparently exchange data with several uses simultaneously independent of their context or level of confidentiality while preserving the confidentiality boundaries of each portal.
Method and system for provision of conditional access to data in broadcast system of mhp or ocap Method and system for provision of conditional access to data in broadcast system of mhp or ocap / 2411665
Request of subscription is created from viewer, in order to realise access to additional paid content, parametre of viewer identification is formed in receiver in response to request of viewer subscription, parametre of viewer identification is saved in receiver, parametre of viewer identification is sent, as well as request of viewer subscription from receiver to broadcasting station along feedback channel, viewer access is authorised to additional paid content, parametre of viewer identification is sent, which has been received at the stage, from broadcast station in transport DVB-stream substantially to all receivers in broadcasting system, a transport DVB-stream is received in receiver, and requested additional paid content is unlocked from transmitted transport DVB-stream in receiver with use of transmitted parametre of user identification and stored parametre of viewer identification.
Method and device to control access to coded data Method and device to control access to coded data / 2409002
Method includes the following stages: receipt of the first control message (ECM1), containing at least one control word (CW) and time score (TS); receipt of the second control message (ECM2), following the first control message (ECM1), besides, the second control message contains at least one control word (CW) and time score (TS); detection of duration of time period, corresponding to difference between time scores (TS) of two serial messages ECM1, ECM2; increasing counter of errors (CE) in case specified duration of time period is less than previously set duration (CP); reducing counter of errors (CE) in case specified duration of time period equals or exceeds specified previously set duration; return of control word (CW) into module of processing (STB) as waiting time expires, which depends on value of counter of errors (CE).
Method to control access to coded data Method to control access to coded data / 2408157
Invention relates to method of control of access to data (CT) coded by means of control words (CW) received by protection module in control messages (ECM) and returned to module of coded data processing. Control messages (ECM) contain at least the first control word (CW1) and the second control word (CW2), at the same time each of specified control words provides access to coded data (CT) during the specified period of time called cryptoperiod (CP). Method includes the following actions: transfer of coded data into at least one module of processing; and transfer of control messages (ECM) into specified processing module, besides, control messages (ECM) contain at least two specified control words (CW1, CW2) and are sent to processing module after transfer of data coded by means of the first control word (CW1) and prior to transfer of data coded by means of the second control word (CW2), time shift between transfer into module of processing of data coded by means of the first control word (CW1) and transfer of control message (ECM), containing the first control word (CW1) and the second control word (CW2), makes more than 75% of cryptoperiod.
Network element configuration scheme Network element configuration scheme / 2476997
Network element apparatus has a communication controller configured to receive a set of parameter values and an indication of a default parameter value of the set; a parameter selector configured to select a parameter value from the set; execute an optimisation algorithm to identify a suitable parameter value from the set; select the default parameter value to provide the selected parameter value if the optimisation algorithm does not identify a suitable parameter value from the set; and a configuration entity configured to configure the network element apparatus based on the selected parameter value. The method describes operation of the network element.

FIELD: radio engineering, communication.

SUBSTANCE: system includes identification unit, conventional frontend access system unit and receiving device, in which identification unit is bi-directionally connected to receiving device, identifies receiving device, generates unique ID of receiver and identification information, and records the corresponding information in data base; conventional frontend access unit is bi-directionally connected to this data base, reads the information about the receiver from data base for coding the control information about receiver identification, and transmits the information to receiving device in relevant addressing mode; conventional frontend access unit switches on the relevant generator of identification information; receiving device uses ID and identification information for provision of safe conventional access to scrambling programs.

EFFECT: increase of safety level.

8 cl, 6 dwg

 

The scope to which the invention relates.

[0001] the Invention relates to the field of digital television (including cable TV, satellite TV, terrestrial TV and IPTV) and mobile media, namely, the conditional access system for digital television and how it is used for transmitting and receiving coded digital data.

Prerequisites to the creation of inventions

[0002] the conditional access System (abbreviated as SA) is used to control so that the subscriber gets only digital TV, including audio, video and digital data, to which you have authorized access, and the operator received money from a person at the expense of control.

[0003] In a digital television system operators use a conditional access system for encoding and transmission of television programmes and only the authorized subscriber can accept them. In addition to the pay television programs, the system SA can provide other additional services, including video on demand, information services and Internet services. Thus, SA increases the revenue of the operators and is the main and most important part of a digital television system.

[0004] However, due to the rapid development of computer and digital technologies SA ordinary with the system has the following disadvantages:

[0005] 1. Low level security

[0006] Conventional SA system for digital television is based mainly on the European DVB standard, which is valid for 10 years. The principle of its operation is described below. The input encoded digital television signal has a pair of periodically changing secret keys, which are called control word, abbreviated as CW. SA system encodes and transmits CW on the device decryption of the digital television receiver to decode. Thus, CW is taken and transmitted to the decoder, in which the stream of audio and video data are received and played back using the playback device.

[0007] During the development of this standard, the main attention was paid on how to securely transmit CW on the receiver, but did not anticipate that the decrypted CW can spread and become widely available through the use of network technologies. Therefore, in the current situation in the conditions of a highly developed network technologies, the system has serious holes that are used by pirates and lead to huge losses operators of digital television.

[0008] a conventional Receiver SA system is often integrated circuit. The encoding algorithm is stored in the chip. The coded data is transferred to the chip, which is CW. CW re is moved to the decoder through the SA device receiver. SA device as a separate part is embedded in the software structure of a decoder channel cable television. This technology is risky, because CW can be caught in several places, as shown in figure 1.

[0009] the First leak of information is the point of contact between the chip and the receiver.

[0010] the Second position information leakage is between the device SA and decoder.

[0011] the Third leak of information is the point of contact between the device SA and RAM.

[0012] None of the SA system device SA is unable to resolve the first and second information leakage. From the third leak of information to get CW is very difficult and expensive. Thus, the second and third place information leaks create more problems. From the first location information leakage CW can be obtained using a simple device and from the second position information leakage it can be obtained by separating the SA device from the decoder channel cable television. Either method is easy to implement with the existing computer technology and leads to the leakage of information in SA, to the extent that the relevant code can be found on the Internet.

[0013] Each SA, the company has two most important secret, one of which is the SA algorithm, and the second CA device. With the exception of owls the local network resources, if the SA algorithm is not disclosed, the system SA is secure as the decryption algorithm, SA is very difficult. However, the decryption module SA is very easy that leads to destruction system SA with microchips.

[0014] because Of the previous decoding system CA with chip time of the module a lot more than the validity of the SA algorithm. Often, the SA algorithm is encoded many times, whereas the SA module remains unchanged. Thus, when the existing situation in terms of a highly developed network technologies pirates more profitable desirability module SA

[0015] In conventional systems SA with chip connection between the chip and cable television are largely fixed, and if changes are there, they are insignificant. In systems SA, which uses a large number of chips, such a change to perform much harder. Thus, even if the provider SA knows leak CW, virtually there is no way this leak to prevent that significantly adversely affects the competitiveness of operators CA. Conventional systems SA with microchips include cable television, in which are embedded several relevant models of SA. Circuitry for decoders of different channels, and modules SA more often ustanavlivaut the manufacturers of decoders channels. Thus, the data about the module SA easily transferred and diverted. Even if the information leakage does not occur, a simple attacker can successfully analyze the SA module in the program memory of the decoder channels. After the information is analyzed, the data can be used for an extended period of time. Thus, the system of SA on the chip has poor security.

[0016] 2. Low versatility

[0017] in order to increase the degree of protection, normal SA system must be kept secret. Each provider SA encodes its data as it can. Thus, the manufacturer decoders cable TV can't install a lot of modules in SA cable television that makes this decoder channels non-generic.

[0018] in Addition, the provider SA is very difficult to provide specific CA system each SA operator. Algorithm SA, SA provided by the supplier remains the same, therefore, if the system is CA used by one of the operators will be decrypted, it hurt all the other operators.

[0019] 3. The high cost of

[0020] In the conventional receiver SA decoder includes at least the device chip, a small device for reading and a special micro is J., that significantly increases the cost of receiving digital television programs, cost overruns and limits the popularization of digital TV.

[0021] in view of the above problems, one objective of the invention is the provision of conditional access systems for digital television, which has a high level of safety, low cost and high versatility and how it is used to transmit and receive coded digital information.

DESCRIPTION

[0022] To achieve the above objectives, the invention proposes a conditional access system for digital television, including the identification block, the block frontend access the receiving device, in which the unit identification associated with bilateral receiver and identifies the receiving device to generate a unique ID and the identification information ID and the identity information stored in the database; block conditional frontend access bilateral linked to a database, retrieves information about the receiving device from the database, encodes the set of control message receiving device and transmits the encoded set of control message to the receiving device in accordance with the mode addressing; next block conditional frontend access includes the gene is ATOR set of control messages and links to the external port of loading; and the receiving device receives the encoded program ID and the identification information.

[0023] In a class of implementation of the present invention, the identification block includes the main chip receiver, a memory chip, chip security, which are merged with the database and has a unique identifier and a data region, which can be written only once and cannot be deleted; the main chip is a ROM that includes the data area; after identifying a unique ID and authentication details are stored in the hardware devices of the receiver and may not be copied.

[0024] In a class of implementation of the present invention, the block frontend access includes scrambler, generator set control message generator set control message and management system subscribers; scrambler receives, processes and transmits audio and video data and encoded information generated by the generator set control messages and generator set control message; control system subscribers controls the generator set control message and performs bidirectional communication with the database; the database danaperino associated with the generator set control message.

[0025] In the class implementation of the present invention the receiver includes a demultiplexer, a CPU, a decoder, a playback device and a memory block; a demultiplexer receives the transmitted encoded stream to obtain two data streams, one of which is encrypted stream audio and video data transmitted over the data channel to the decoder for decoding, and the other is a set of control message and set the control message; set the control message and set the control message is processed by the CPU and transferred to descramble the control unit to obtain the control word; the decoder uses the control word to decrypt the encoded stream audio and video; the resulting stream is decoded audio and video data is transmitted to the playback device for playback.

[0026] In the conditional access system you can easily modify the algorithm of the system conditional access receiver and a conditional access frontend device. Due to periodic changes of the algorithm of conditional access system security system is considerably increased.

[0027] the Method of use of conditional access systems for digital television transmission and reception of encrypted qi is the global data

[0028] a) the identification process: in this phase, the system identification of the receiver after fabrication, inspection coordination devices and check the current information about the receiver, and includes the coordination of the main chip with chip security in accordance with the algorithm and registration of mutual information and General information; coordination of the main chip with the memory chip in accordance with the algorithm and registration of mutual information and General information; transfer of all the information receiver to the authentication server, where the information is checked; check the historical data in the database and assign a unique ID and a security code receiver, ID acts as the basis for conditional addressing and the security code is valid for verifying the authenticity of the receiver.

[0029] b) procedure conditional frontend access: query management system subscribers ID number from the database upon receiving the command from the operator, if it exists, sending the command to the input device conditional access, generating data in accordance with information about the receiver as a secret key encrypted set of the control message, generating an encrypted set of the control message generator set control message, and the input digital television network cher the C encoder, simultaneously generating set control message generator set control messages and the input digital television network;

[0030] (C) procedure end conditional access: the division of the digital signals, the receiver and generating an encrypted audio and video data, which is passed directly to the decoder, and digital set control message and set the control message, selecting a set of control message in the memory to generate valid information and the set of messages; and

[0031] d) a change in the algorithm of conditional access systems: when the algorithm used conditional access systems decrypted or should be changed for security reasons, is a sequence of actions, including: uploading a new algorithm for conditional access systems through the hub, the encoder and Converter with input devices conditional access in a network of digital television, the receiver obtained a new algorithm for conditional access systems and the old algorithm of conditional access system is replaced with a new algorithm for conditional access systems.

[0032] In the class implementation of the present invention in step C), the receiver first checks the agreement of the main chip with chip security and and approval of the main chip with the memory chip; after successful completion of testing in accordance with the ID of the receiver selects the current set of control message and a secret key set of the control message is calculated in accordance with the agreed information; set control message generated decrypted and permission to decrypt the set of control messages and the second secret key; set the control message is decrypted and generates a control word that is transmitted to the decoder; the decoder decodes audio and video data in accordance with control word; the decoded audio and video data is transmitted to the playback device for playback.

[0033] In the class implementation of the present invention, in the step d), a new algorithm for conditional access systems not replaces the old algorithm of conditional access system, and is stored in the receiver so that the receiver there are two types of algorithms for conditional access systems; the receiver selects the algorithm conditional access systems of the two types of algorithms for conditional access system in accordance with the algorithm of conditional access system used by the input device for receiving encrypted audio and video data. In addition, to prevent resanctioning the use of the algorithm of conditional access system checks the validity of the receiver module, therefore illegally installed the receiver cannot use the modified algorithm of conditional access systems.

[0034] the standard DVB is used for more than 10 years, and the corresponding input and output equipment occupies a large market share, changes to this standard means the modernization of equipment that will cost a lot of money. The present invention solves the problem of security for the average conditional access under the existing DVB, and the proposed system has high versatility. In the present invention, the SA module and the application program are integrated into one module, the SA algorithm and the SA module is not divided, so information about CW cannot be obtained from the receiver module, which ensures the security of the system. In addition, the system does not include chips, and therefore, the conjugated chip reader with chips, a special chip saves, and SA are simplified, which significantly reduces the cost of the receiver.

[0035] the Advantages provided by the invention are listed below. This system does not include the circuit and, consequently, the conjugated chip reader with chips, and a special chip is saved, and the program system SA simplified, significantly reduces the cost of PR is amnike. The present invention eliminates the first leak of information about the CW previously used conditional access systems from the frontend to the end, and because the block SA and application programs combined, there is no second place leak CW inherent in previously used the conditional access systems. Despite the fact that CW can be decrypted due to theft in companies that produce chips, they are at high commercial and regulatory risk. In the present invention for obtaining CW from the third leak previously used conditional access systems should decrypt all programs receiving device, therefore, the commercial value of such a method of obtaining completely absent. Because all existing chips support the implementation of the downloaded code, the encoding algorithm of conditional access systems can be changed to the new dynamic code transmitted from the system conditional frontend access. If the modification time is less than the time of decryption, the decryption of encrypted algorithm becomes meaningless, which increases the security of the system. In addition, since the receiving device supports the implementation of downloaded code in different regions of the receiving device that includes the same software and hardware izbiratelni is to download and implement the programs of different operators of digital television, that increases the versatility between the receiver and the conditional access system.

[0036] Thus, the present invention avoids the disadvantages of conventional conditional access systems, such as low security, high cost, low flexibility, and represents the conditional access system for digital television, high security, low cost, high versatility, simple construction and easy to use.

[0037] figure 1 shows the scheme of the loss of secrecy conventional conditional access systems with chip previously used in the conditional access systems;

[0038] figure 2 shows the General scheme of a conventional conditional access systems in accordance with one embodiment of the invention;

[0039] figure 3 shows a diagram of the complete identification in accordance with one embodiment of the invention;

[0040] figure 4 presents a block circuit diagram of conventional system conventional frontend access in accordance with one embodiment of the invention;

[0041] figure 5 shows a diagram of a receiving device in accordance with one embodiment of the invention; and

[0042] figure 6 presents a detailed diagram of a conventional conditional access systems in accordance with one embodiment of the invention.

<> [0043] Legend: 1. Database. 2. Block conditional frontend access. 3. The identification block. 4. The receiving device. 5. The main chip. 6. Chip security. 7. The memory chip. 8. Scrambler. 9. The generator set control messages. 10. The generator set control message. 11. Management system subscribers. 12. Descrambler (decoder). 13. The device separation. 14. The Central processor. 15. The playback device. 16. Device management division. 17. RAM (memory block).

[0044] the invention is described below with reference to the accompanying drawings.

[0045] figure 2 shows a General diagram of a conventional conditional access systems. The system includes the identification block 3, block frontend access 2 and the receiving device 4. The identification block 3 bilateral connected and identifies the receiving device 4 to generate a unique ID and the identification information (A1-A2). ID and information about the identity of the receiving device 4 and stored in the database 1(A3). Unit 2 conditional frontend access bilateral linked to a database 1 receives information about the receiving device from the database 1, encodes the set of control message receiving device (A1*-A2*) and sends the encrypted set of control message to the receiving device 4 in the mode is e addressing (A3*); unit 2 conditional frontend access further includes the generator set control message; and the receiving device 4 receives the encrypted program using the ID, the identification information and software. The receiving device can modify the algorithm of conditional access system in accordance with the unit (A1**) system conditional frontend access.

[0046] figure 3 shows the execution scheme identification. The process includes adjusting the main chip 5 chip memory 7 according to the algorithm and registration information about each other and shared information (B1, B7); harmonization of the main chip 5 chip 6 by the algorithm and registration information about each other and shared information (B2, B8); harmonization security chip 6 chip memory 7 according to the algorithm and registration information about each other and shared information (B1, B2); the transfer of all the information receiver to the authentication server (B3), where the data is checked; the registration is successfully validated data in the database B4) and assigning a unique receiver ID and security code (B5-B6). ID and security code are encoded and stored in the memory chip 7 and the chip 6 (B7, B8). ID is the basis of conventional addressing, and security code serves as a basis to verify the identity of the receiver.

[0047] figure 4 shows with the EMA unit conditional frontend access 2. The process involves querying the ID from the database management system 11 subscribers after receiving commands from the operator (C21), if it exists, send the command block frontend access 2 (C22), generating data in accordance with information about the receiver in the form of a secret key of the encoded set of messages (C23), the generation of the encoded set of the control message generator set control message 10 and the input network digital television (C4) together with audio and video data (C1) through the scrambler 8, this will generate a set of control message generator set control messages 9 and enter in a network of digital television (Sz).

[0048] figure 5 shows a diagram of the receiving device. The process involves separating the digital signals (D0) using separation devices 13 of the receiver to generate audio and video data that is encoded by the scrambler 8 and is passed directly to the control unit decodes 16 (D1), and the set of control messages and set the control message that is transmitted to the Central processor 14 connected to the memory chip 7 and the chip 6, filtering the set of control messages in memory to generate a set of messages (D2-D5). PEFC is getting installed message and a secret key for decrypting the set of control messages, set the control message is decrypted and the result is a control word that is transmitted to the decoder 12 (D6). The decoder 12 decodes the audio and video data in accordance with the control word, and the decoded audio and video data are transmitted to the device 15 for playback (D7-D8).

[0049] figure 6 shows a detailed diagram of the processor conditional access, with which the current set of control message is filtered and decrypted in the memory unit 17. The process involves two-way communication with a Central processor 14 and memory unit 17, the chip 6, and the memory chip 7, respectively, the synchronization check the main chip 5 chip 6, the coordination of the main chip 5 with the memory chip 7, and coordination of the security chip 6 chip memory 5 (E1-E2), if not specified, the operation is terminated if the agreement is filtered current set of control message (E3) in accordance with the identifier of the receiver, the calculation of the secret key installed in accordance with information (E4), and decrypting the set of control messages for subsequent processing (E5).

[0050] the Method of use of conditional access systems for digital television transmission and reception of kopirovany the digital data, including

[0051] a) the identification process: in this phase, the system identification of the receiver after its manufacture, and test of coordination between the hardware and check the current information about the receiver, including coordination of the main chip with chip security algorithm and registration of mutual information and General information: approval for the main chip with the memory chip and registration of mutual information and General information; coordination of the main chip with the memory chip according to the algorithm and registration of mutual information and General information; coordination of security chip and the memory chip according to the algorithm and registration of mutual information and General information; the transmission of all information receiver, the authentication server, where the data is checked; the registration is successfully validated data into the database and assign a unique ID and security code receiver ID is the basis for conventional addressing, and security code serves as a basis to verify the identity of the receiver.

[0052] b) a frontend conditional access: query ID from the database management system subscribers after receiving commands from the operator, if there is, send the command block frontend access, generating data in accordance with information about when is the MSC in the form of a secret key of the encoded set of the control message, generating an encoded set of the control message generator set control messages, and network logon digital television through a scrambler, this will generate a set of control message generator set control messages and log on to the network digital television;

[0053] (C) procedure end conditional access: the division of the digital signals by the receiver to generate the encrypted audio and video data, which is passed directly to the decoder, and set centralnego message and set the control message, filtering the set of control messages in the memory to generate effective information and the set of messages; and

[0054] the algorithm Update conditional access systems: if the algorithm used conditional access systems decrypted or requires updating for security reasons, the procedure comprising: transmitting a new algorithm for conditional access systems through the hub, the scrambler and the modulator with a frontend block conditional access in a network of digital television, the reception of the new algorithm system conditional access receiver, and update the old algorithm conditional access systems new algorithm conditional access systems

[0055] In particular, this is ne), first, the receiver checks the agreement of the main chip with chip security, coordination core chip with memory chip and coordination chip security chip memory; after successful verification, filtered active set control message according to the ID of the receiver and calculates the secret key set of the control message in accordance with information about the agreement established the control message generated decrypted and permission to decrypt the set of control messages and one secret key; set the control message is decrypted and generates a control word that is transmitted to the decoder; the decoder decodes audio and video data in accordance with control word; the decoded audio and video data is transmitted to the playback device for playback.

[0056]. Namely, at step d), a new algorithm of conditional access system does not replace the old algorithm used conditional access systems, but is stored in the receiver so that the receiver there are two types of algorithm of conditional access system; the receiver selects the algorithm conditional access systems of these two algorithms of conditional access system in accordance with the algorithm of the system condition is on access, used by conditional block frontend access to encrypted audio and video data. In addition, to prevent unauthorized use of the algorithm of conditional access system checks the legality of the receiving device, so that illegally used by the receiving device could not use the updated algorithm of conditional access systems.

[0057] the Algorithm of conditional access system according to the invention may be any algorithm supported by the DVB standard.

[0058] They are not described in detail in the description of the invention disclosed in prototypes.

1. Conditional access system for digital television, including the identification block, the frontend the conditional access module and the receiving device,
characterized in that the unit identification associated danaperino with the receiving device and identifies the receiving device to generate a unique ID and the identification information ID and the identification information registered in the database;
the frontend module conditional access related danaperino database receives information about the receiving device from the database, encodes the message on the pre-reception receiver and transmits the encoded message on the pre-reception at the receiving device is in mode and is resale; the frontend of the conditional access module comprises a generator messages access control and is connected to the external port of loading; and
the receiving device receives the encoded program using ID and identification information.

2. Conditional access system for digital television according to claim 1, characterized in that the identification block includes a primary chip receiver, a memory chip, while they work with the database and have a unique ID and a data region, which is written only once and cannot be deleted; and the main chip is a ROM that includes the data area; after identifying the unique ID and the identification information stored in the hardware of the receiver and may not be copied.

3. Conditional access system for digital television according to claim 1, characterized in that the frontend the conditional access module includes a scrambler, the generator of the message access control, the generator of the message on the pre-reception and management system subscribers; and scrambler receives, processes and transmits audio and video data and encoded information generated by the message generator, access control and message generators on the pre-reception, and the control system subscribers controls the message generator is authorized, receiving, and connected danaperino database; the database is connected, donapaula with the message generator on the pre-reception.

4. Conditional access system for digital television according to claim 1, wherein the receiving device includes a device for decoding, CPU, descrambler, the playback device, the control unit decoding and memory unit; and a device for decoding receives the transmitted encoded stream and takes two streams of data, one of which is a stream of encoded audio and video data transmitted over the data channel to the device for decoding the second stream is the message access control and message on the pre-admission; the message access control and message on the pre-admission are processed by the CPU and transferred to the control unit decoding to obtain the control word; a device for decoding uses the control word to decode the encoded stream of audio and video data; and in the stream decoded audio and video data is transmitted to the playback device.

5. Application of the conditional access systems for digital television according to claim 1 for transmitting and receiving encoded digital data, including
a) identification: this stage is dimensioned General identification of the receiver, check reconciliation between hardware, recording information about the receiver, including coordination of the main chip with chip security algorithm and registration of mutual information and General information; coordination of the main chip with the memory chip according to the algorithm and registration of mutual information and General information; coordination of security chip with a memory chip according to the algorithm and the mutual registration and General information; transfer of all the information receiver to the authentication server, where the data is checked; the registration is successfully validated data in the database and assign a unique ID and security code receiver, and ID is used for relative addressing, and the security code is used to check identification of the equipment;
b) the procedure conditional frontend access: query ID from the database management system subscribers after receiving commands from the operator, the transmission of commands to the frontend of the conditional access module, generating data in accordance with information about the receiver in the form of a secret key of the encoded message on the pre-reception, generating the encoded message on the pre-acceptance message generators on the pre-admission and entrance to a network of digital television through a scrambler, while g is narisovanii messages access control message generators access control and network logon digital television;
c) procedure end conditional access: division of digital signals to generate the encoded audio and video data, which is passed directly to the device for decoding and generation of messages access control and message on the pre-reception, message transmission control access to the memory for generating current information and messages on the pre-admission; and
d) updating algorithm of conditional access system: when the algorithm used conditional access systems decoded or requires updating of the security procedure, including:
uploading a new algorithm for conditional access systems through the hub, the scrambler and the modulator from the frontend conditional access module in a network of digital television, the reception of the new algorithm system conditional access receiver and replace the old algorithm conditional access systems new algorithm for conditional access systems.

6. The method according to claim 5, characterized in that in stage C), the receiver first checks the agreement of the main chip with chip security, coordination core chip with a memory chip, matching chip security chip memory; in case of approval in accordance with the ID of the receiver selects the current message on sanction is for receiving, and a secret key messages about the sanctioned intake is calculated in accordance with the agreed information; the message on the pre-reception is decoded to generate a permit decoding of the message access control and other secret key; the message access control is decoded to generate the control word that is transmitted to the decoder; the decoder decodes audio and video by means of the control word; audio and video data is transmitted to the playback device.

7. The method according to claim 5, characterized in that in step d), a new algorithm of conditional access system does not replace the old algorithm of conditional access system, which has been used and stored in the receiver so that the receiver there are two types of algorithms for conditional access systems; the receiver selects the algorithm conditional access systems of these two types of algorithms for conditional access system in accordance with the algorithm of conditional access systems used by frontend with a conditional access module for receiving the encoded audio and video data.

8. The method according to claim 5, characterized in that in step d) to prevent unauthorized use of the algorithm of conditional access system, checks the legality of the use of the receiving device so that illegally used the receiving device is the Creator could not use the modified algorithm of conditional access systems.

 

© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English.