WO1991012693A1 - Apparatus and method for controlling access to broadcast signals - Google Patents

Apparatus and method for controlling access to broadcast signals Download PDF

Info

Publication number
WO1991012693A1
WO1991012693A1 PCT/GB1991/000228 GB9100228W WO9112693A1 WO 1991012693 A1 WO1991012693 A1 WO 1991012693A1 GB 9100228 W GB9100228 W GB 9100228W WO 9112693 A1 WO9112693 A1 WO 9112693A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
deciphering
ciphered
message
broadcast
Prior art date
Application number
PCT/GB1991/000228
Other languages
French (fr)
Inventor
William Mcmullan Hawthorne
Original Assignee
Enfranchise Sixty Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Enfranchise Sixty Limited filed Critical Enfranchise Sixty Limited
Publication of WO1991012693A1 publication Critical patent/WO1991012693A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H60/00Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
    • H04H60/09Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
    • H04H60/14Arrangements for conditional access to broadcast information or to broadcast-related services
    • H04H60/23Arrangements for conditional access to broadcast information or to broadcast-related services using cryptography, e.g. encryption, authentication, key distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H60/00Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
    • H04H60/76Arrangements characterised by transmission systems other than for broadcast, e.g. the Internet
    • H04H60/81Arrangements characterised by transmission systems other than for broadcast, e.g. the Internet characterised by the transmission system itself
    • H04H60/93Wired transmission systems
    • H04H60/94Telephonic networks

Definitions

  • This invention relates to the control of access to broadcast signals, particularly, but not exclusively, video services such as television programmes and broadcast data services such as financial and medical information services.
  • video services such as television programmes
  • broadcast data services such as financial and medical information services.
  • access control and regulation is of use in ensuring payment for selected broadcast services by subscribing users.
  • the control of access presents two problems.
  • the first problem is to provide a method of distorting, scrambling or otherwise enciphering the broadest signal so that it becomes substantially meaningless to a non- subscribing viewer, and at the same time the method should be strong in terms of irreversibility so that it becomes very difficult or uneconomic to manufacture unauthorised or pirate devices for recreating the plain signal.
  • a number of suitable ciphers are known to those skilled in the communication arts.
  • the cipher should preferably be a key symmetric cipher.
  • the second problem is to provide a method and apparatus for ensuring that the user cannot continue to gain access after his subscription expires or his contract with the broadcasting agency ceases to be in force.
  • This problem is more difficult because the user has already been provided with a control device or decoder for use during his subscription period and may decline to return his decoder, necessitating expensive legal proceedings. Even if the cipher is changed at the end of each subscription period, the decoder itself constitutes a structure for reverse engineering by a potential manufacturer of pirate devices who will assume that the cipher changes will be trivial.
  • the problem is to provide such a control device which will for all practical purposes be useless after expiry of a subscription but which can be rendered operative again should the subscription subsequently be renewed.
  • An object of the present invention is to provide a method and apparatus which allows solution of this technical problem.
  • memory means for storing a first substantially unique key
  • first deciphering means activated by said first key to decipher said ciphered message by use of said first deciphering algorithm whereby the deciphered message constitutes a second key
  • second deciphering means activated by said second key to decipher a received ciphered broadcast video signal by use of said second deciphering algorithm.
  • the present invention also includes within its scope a method of controlling access to a broadcast signal, and independently a method of gaining local access to a broadcast signal, substantially as described herein with reference to, and as illustrated in, the accompanying drawings. Furthermore, the invention includes within its scope television receiver control apparatus substantially as described herein with reference to, and as illustrated in, the accompanying drawings.
  • Figure 1 is a block circuit diagram of an access control unit according to the invention, for use with a subscriber's television receiver;
  • Figure 2 is a flow chart of operation of a control method according to the invention.
  • FIG. 1 shows a control unit 10 for use with a television receiver 23 to control access to a video signal which is broadcast in ciphered form.
  • the control unit has an input 11 connected to the local TV antenna 12, and an output 13 connected to the television receiver antenna input socket 14.
  • the control unit is adapted to decipher a ciphered video signal received at its input 11 and to provide a deciphered plain video signal at its output 13.
  • the control unit 10 contains memory means 15 which includes a memory for storing a first key termed the Message or M-cipher key, and memories for storing first and second deciphering algorithms referred to as the M and V deciphering algorithms respectively.
  • the memory is suitably an integrated circuit chip. Before delivery to the user the memory chip is primed with the M and V deciphering algorithms and with a substantially unique M- -5-
  • the M-cipher key is suitably in the form of a serial number in the range of from 1 to 1,000,000,000,000 whereby the system can create up to a million million different ciphertext messages from a single plain text message and can thereby accommodate a million million subscribers.
  • the M-cipher is a key symmetric message cipher, i.e a cipher which, in response to activation by a key, converts an intelligible stream of letters and numbers, i.e the message, into an unintelligible stream, at d which also operates in reverse to convert the unintelligible stream back to the intelligible stream upon activation by an identical key.
  • the V-cipher is a key symmetric video cipher which applies the same properties of key activation and reversibility to a video signal.
  • the broadcast video signal is ciphered by use of the V- cipher key before transmission.
  • the ciphered broadcast video signal is thus common to all subscribers and there is no requirement to broadcast individualised coded video signals.
  • a user in possession of a primed control unit Upon payment or renewal of his subscription a user in possession of a primed control unit receives a ciphered message to allow him to enable the control unit.
  • the ciphered message is referred to as
  • Each message is in numerical form and consists of M-cipher ciphertext of the V-cipher key for the next broadcasting period from the pertinent broadcasting organisation.
  • Each UCI is substantially unique because it has been created by using the M-cipher key specific to each subscriber.
  • the control unit 10 is provided with data entry means 16 connected to a data input circuit 17 so that the user can enter his UCI message.
  • the data entry means can be a numerical keyboard or keypad, an alphanumeric keyboard, a slot to accept a coded card, a modem connected to a public telephone line or any other convenient arrangement.
  • the UCI message can be represented in print and sent to the subscriber by mail who then enters the number on the keyboard.
  • the UCI message can alternatively be embodied in a punched card, a magnetic strip card, a dumb memory card containing memory but no processor, or a smart memory card containing both a memory and a processor. These cards can be sent by mail to the user who then inserts the card in the slot in the control unit and the UCI message is transferred by means appropriate to the type of card, as known to those in the art.
  • the UCI message When the UCI message is embodied in print or on a card it can be sent by mail or the subscriber can apply to a vending station.
  • An alternative arrangement which offers greater flexibility is for the control unit to receive the UCI message through a modem or other device coupled to a public telephone line, in response to a telephoned request by the subscriber. This would allow an accounting and management system to be automatically linked to the existing telephone account billing system, and will also permit great flexibility in the terms and periods for each UCI message.
  • the UCI message When the UCI message is entered into the control unit it is deciphered by use of the unique M-cipher key stored in the local memory 15 in accordance with the M-deciphering algorithm also stored in the local memory 15, whereby to constitute the V-cipher key.
  • the deciphering is effected by a processor 18 connected through a latch 19 to the data input circuit 17. Because the UCI message is unique to that subscriber he cannot make use of any UCI message supplied to any other subscriber and nor can the other subscriber make use of the first subscriber's UCI message. If any such inappropriate UCI message is entered into a control unit it cannot operate to generate the necessary V-cipher key.
  • the V-cipher key generated from the UCI by the M-cipher key and the M-algorithm is ⁇ common to all users and is specific to a predetermined pay time period.
  • a subscriber is issued with a data card once a year to give him blanket access to all channels b * _. roadcast in V-cipher form. This would replicate the present contractual position with regard to the BBC annual licence fee *
  • the invention is however adaptable to numerous other possibilities at various levels of selective viewing. For example broadcast programmes can be categorised as sport, news, entertainment, features etc., . and the pay period can be 3 months, 6 months etc., and can be specific to one or more selected broadcast channels. At its most flexible a particular UCI message could cover simply a single programme for which there is high demand such as a World Cup football final.
  • a UCI message in plaintext i.e before M- ciphering
  • the portion 329 is a broadcasting station identifier
  • the portion 46 is a time period identifier
  • the portion 6219 is the V-cipher decipheiing key applicable to V-ciphered broadcasts to take place in the identified time period 46.
  • This example requires the station identifier and the time period to be broadcast together with the ciphered broadcast video signal.
  • the broadcast video signal including the station identifier and the time period is common to all subscribers, and no individualised signals are broadcast.
  • the control unit locally generates the necessary V- cipher key and extracts the station identifier and the time period from the UCI, and then stores these items in memory within memory means 15 for on-line use.
  • the signal captured by his local antenna 12 is supplied through input 11 to a video processor 20.
  • the processor 20 deciphers the ciphered video signal on-line using the V-cipher key and in accordance with the V-deciphering algorithm also stored in memory 15 and supplied to and from the processor 20 through latches 21 and 22.
  • the deciphered plain video signal is fed out from output terminal 13.
  • the processor 20 is enabled to operate only if the station identifier and the time period broadcast with the video signal coincide with the station identifier and time period extracted from the UCI message and currently stored for comparison in memory 15.
  • Figure 2 shows a flow chart which summarises a method according to the invention using relatively short number sequences as examples.
  • the numerals 3214, 5587 and 9016 in Figure 2 are the unique UCI's sent to each subscriber.
  • control centre 25 selects 7093 as the V-cipher key which will be employed in the next broadcasting time period ( see
  • the centre 25 uses the M-ciphering algorithm on 7093 successively in combination with each unique M-cipher key to create the unique UCI messages for each subscriber ( see 25.2 ) .
  • subscribers 1, 2 and 3 have been allotted M-cipher keys 9618; 2903; and
  • the UCI messages for subscribers 1, 2 and 3 might then be 3214; 5587; and 9016, as shown in Figure 2.
  • the station identifier and the time period identifier ana any other relevant information are added to the UCI messages which are then mailed or otherwise transmitted to the individual subscribers.
  • Subscriber number 1 inputs UCI message 3214 and his controi unit uses its unique local M-cipher key 9618 to decipher 3214 to constitute the original V-cipher key 7093 (see 26.2).
  • control unit of subscriber number 2 uses its unique M-cipher key 2903 to decipher 5587 to constitute the same original V-cipher key 7093 ( see 27.2), and the control unit of subscriber number 3 uses its unique M-cipher key 7854 to decipher 9016 to constitute the same original V-cipher key 7093 ⁇ see 28.2).
  • V-cipher key 7093 generated in each subscriber's control unit can then decipher a programme broadcast in V-enciphered form ( see 24.1 ) in the relevant time period as described above ( see 26.3, 27.3 and 2S.3 respectively).

Abstract

A method of controlling access to a broadcast signal characterised by the method comprising: issuing a first substantially unique key to each intending user; issuing to each user to be allowed access a message enciphered by use of the key unique to that user so as to permit local deciphering of the ciphered message by use of the issued first key to constitute a second key; and broadcasting a signal enciphered by use of said second key so as to permit local deciphering of the ciphered signal by use of the second key. The invention also provides a television receiver control apparatus for use with the above method.

Description

APPARATUS AND METHOD FOR CCWTROLLT G ACCESS TO BROADCAST
SIGNALS
Field of the Invention
This invention relates to the control of access to broadcast signals, particularly, but not exclusively, video services such as television programmes and broadcast data services such as financial and medical information services. Such access control and regulation is of use in ensuring payment for selected broadcast services by subscribing users.
Background to the Invention
The control of access presents two problems. The first problem is to provide a method of distorting, scrambling or otherwise enciphering the broadest signal so that it becomes substantially meaningless to a non- subscribing viewer, and at the same time the method should be strong in terms of irreversibility so that it becomes very difficult or uneconomic to manufacture unauthorised or pirate devices for recreating the plain signal. A number of suitable ciphers are known to those skilled in the communication arts. The cipher should preferably be a key symmetric cipher.
The second problem is to provide a method and apparatus for ensuring that the user cannot continue to gain access after his subscription expires or his contract with the broadcasting agency ceases to be in force. This problem is more difficult because the user has already been provided with a control device or decoder for use during his subscription period and may decline to return his decoder, necessitating expensive legal proceedings. Even if the cipher is changed at the end of each subscription period, the decoder itself constitutes a structure for reverse engineering by a potential manufacturer of pirate devices who will assume that the cipher changes will be trivial. The problem is to provide such a control device which will for all practical purposes be useless after expiry of a subscription but which can be rendered operative again should the subscription subsequently be renewed.
An object of the present invention is to provide a method and apparatus which allows solution of this technical problem.
Summary of the Invention
According to the present invention in one aspect there is provided a method of controlling access to a broadcast signal characterised by the method comprising:
issuing a first substantially unique key to each intending user;
issuing to each user to be allowed access a message enciphered by use of the key unique to that user so as to permit local deciphering of the ciphered message by use of the issued first key to constitute a second key; and
broadcasting a signal enciphered by use of said second key so as to permit local deciphering of the ciphered signal by use of the second key.
In another aspect the invention provides a method of gaining local access to a broadcast signal characterised by the method comprising:
locally storing a first substantially unique key; locally storing first and second deciphering algorithms;
locally entering a ciphered mes'sage which has been ciphered at another location by use of said first key;
deciphering said ciphered message by use of said local first key and the first algorithm to constitute a second key; and
receiving and deciphering a ciphered broadcast signal by use of said second key and the second algorithm, said broadcast signal having been ciphered at another location by use of a second key.
In a further aspect the invention provides television receiver control apparatus characterised in that the apparatus comprises:
memory means for storing a first substantially unique key;
first means for storing a first deciphering algorithm;
second means for storing a second deciphering algorithm;
data entry means for entry of a ciphered message by a user seeking access to a broadcast video signal;
first deciphering means activated by said first key to decipher said ciphered message by use of said first deciphering algorithm whereby the deciphered message constitutes a second key; and
second deciphering means activated by said second key to decipher a received ciphered broadcast video signal by use of said second deciphering algorithm.
The present invention also includes within its scope a method of controlling access to a broadcast signal, and independently a method of gaining local access to a broadcast signal, substantially as described herein with reference to, and as illustrated in, the accompanying drawings. Furthermore, the invention includes within its scope television receiver control apparatus substantially as described herein with reference to, and as illustrated in, the accompanying drawings.
An embodiment of the invention will now be described, by way of example, with reference to the accompanying drawings; in which:
Brief Description of th * rawings
Figure 1 is a block circuit diagram of an access control unit according to the invention, for use with a subscriber's television receiver; and
Figure 2 is a flow chart of operation of a control method according to the invention.
Description of the Preferred Embodiment
Figure 1 shows a control unit 10 for use with a television receiver 23 to control access to a video signal which is broadcast in ciphered form. The control unit has an input 11 connected to the local TV antenna 12, and an output 13 connected to the television receiver antenna input socket 14. The control unit is adapted to decipher a ciphered video signal received at its input 11 and to provide a deciphered plain video signal at its output 13.
The control unit 10 contains memory means 15 which includes a memory for storing a first key termed the Message or M-cipher key, and memories for storing first and second deciphering algorithms referred to as the M and V deciphering algorithms respectively. The memory is suitably an integrated circuit chip. Before delivery to the user the memory chip is primed with the M and V deciphering algorithms and with a substantially unique M- -5-
cipher key. The M-cipher key is suitably in the form of a serial number in the range of from 1 to 1,000,000,000,000 whereby the system can create up to a million million different ciphertext messages from a single plain text message and can thereby accommodate a million million subscribers.
The M-cipher is a key symmetric message cipher, i.e a cipher which, in response to activation by a key, converts an intelligible stream of letters and numbers, i.e the message, into an unintelligible stream, at d which also operates in reverse to convert the unintelligible stream back to the intelligible stream upon activation by an identical key.
The V-cipher is a key symmetric video cipher which applies the same properties of key activation and reversibility to a video signal. The broadcast video signal is ciphered by use of the V- cipher key before transmission. The ciphered broadcast video signal is thus common to all subscribers and there is no requirement to broadcast individualised coded video signals.
Upon payment or renewal of his subscription a user in possession of a primed control unit receives a ciphered message to allow him to enable the control unit. The ciphered message is referred to as
Unique Customer Information or UCI. Each message is in numerical form and consists of M-cipher ciphertext of the V-cipher key for the next broadcasting period from the pertinent broadcasting organisation. Each UCI is substantially unique because it has been created by using the M-cipher key specific to each subscriber.
The control unit 10 is provided with data entry means 16 connected to a data input circuit 17 so that the user can enter his UCI message. The data entry means can be a numerical keyboard or keypad, an alphanumeric keyboard, a slot to accept a coded card, a modem connected to a public telephone line or any other convenient arrangement. The UCI message can be represented in print and sent to the subscriber by mail who then enters the number on the keyboard. The UCI message can alternatively be embodied in a punched card, a magnetic strip card, a dumb memory card containing memory but no processor, or a smart memory card containing both a memory and a processor. These cards can be sent by mail to the user who then inserts the card in the slot in the control unit and the UCI message is transferred by means appropriate to the type of card, as known to those in the art.
When the UCI message is embodied in print or on a card it can be sent by mail or the subscriber can apply to a vending station. An alternative arrangement which offers greater flexibility is for the control unit to receive the UCI message through a modem or other device coupled to a public telephone line, in response to a telephoned request by the subscriber. This would allow an accounting and management system to be automatically linked to the existing telephone account billing system, and will also permit great flexibility in the terms and periods for each UCI message.
When the UCI message is entered into the control unit it is deciphered by use of the unique M-cipher key stored in the local memory 15 in accordance with the M-deciphering algorithm also stored in the local memory 15, whereby to constitute the V-cipher key. The deciphering is effected by a processor 18 connected through a latch 19 to the data input circuit 17. Because the UCI message is unique to that subscriber he cannot make use of any UCI message supplied to any other subscriber and nor can the other subscriber make use of the first subscriber's UCI message. If any such inappropriate UCI message is entered into a control unit it cannot operate to generate the necessary V-cipher key. If the subscriber ceases payment and the subscription period expires, his previous UCI message and the control unit become useless since a fresh UCI message is then necessary for the next period. The V-cipher key generated from the UCI by the M-cipher key and the M-algorithm is ^common to all users and is specific to a predetermined pay time period. In a very simple arrangement, a subscriber is issued with a data card once a year to give him blanket access to all channels b *_. roadcast in V-cipher form. This would replicate the present contractual position with regard to the BBC annual licence fee* The invention is however adaptable to numerous other possibilities at various levels of selective viewing. For example broadcast programmes can be categorised as sport, news, entertainment, features etc., . and the pay period can be 3 months, 6 months etc., and can be specific to one or more selected broadcast channels. At its most flexible a particular UCI message could cover simply a single programme for which there is high demand such as a World Cup football final.
By way of example a UCI message in plaintext, i.e before M- ciphering, might be the number sequence 329466219. The portion 329 is a broadcasting station identifier, the portion 46 is a time period identifier, and the portion 6219 is the V-cipher decipheiing key applicable to V-ciphered broadcasts to take place in the identified time period 46. This example requires the station identifier and the time period to be broadcast together with the ciphered broadcast video signal. This can be accomplished by any of the various methods "known to those in the art, for example within the videotext lines, in the lines at the extremities of the active picture area, in digital form within the line or frame synchronisation signals, or modulated on to a sub-carrier transmitted together with the video signal. The broadcast video signal including the station identifier and the time period is common to all subscribers, and no individualised signals are broadcast.
In operation the control unit locally generates the necessary V- cipher key and extracts the station identifier and the time period from the UCI, and then stores these items in memory within memory means 15 for on-line use. When the user wishes to view a programme broadcast in V-cipher form, the signal captured by his local antenna 12 is supplied through input 11 to a video processor 20. The processor 20 deciphers the ciphered video signal on-line using the V-cipher key and in accordance with the V-deciphering algorithm also stored in memory 15 and supplied to and from the processor 20 through latches 21 and 22. The deciphered plain video signal is fed out from output terminal 13. The processor 20 is enabled to operate only if the station identifier and the time period broadcast with the video signal coincide with the station identifier and time period extracted from the UCI message and currently stored for comparison in memory 15.
Figure 2 shows a flow chart which summarises a method according to the invention using relatively short number sequences as examples.
Figure 2 may be understood using the identification table that follows:
TΩ KTTFTCATTO ABLE
24 Broadcasting station
24.1 Transmits programme enciphered with V-key = 7093
25 Control centre
25.1 Inputs V = 7093 into M-cipher
25.2 Creates unique UCI messages as M-cipher text of 7093 using M-keys 9618; 2903; 7854
25.3 Unique UCI is sent to each subscriber
26 Subscriber 1 26.1 M-cipher key = 9618
26.2 M-cipher deciphers 3214; V-key = 7093
26.3 V-cipher deciphers broadcast
27 Subscriber 2
27.1 M-cipher key = 2903
27.2 M-cipher deciphers 5587; V-key = 7093
27.3 V-cipher deciphers broadcast
28 Subscriber 3
28.1 M-cipher key = 7854
28.2 M-cipher deciphers 9016; V-key = 7093
28.3 V-cipher deciphers broadcast
The numerals 3214, 5587 and 9016 in Figure 2 are the unique UCI's sent to each subscriber.
Briefly the control centre 25 selects 7093 as the V-cipher key which will be employed in the next broadcasting time period ( see
25.1 ). The centre 25 then uses the M-ciphering algorithm on 7093 successively in combination with each unique M-cipher key to create the unique UCI messages for each subscriber ( see 25.2 ). For example, subscribers 1, 2 and 3 (see 26, 27 and 28 respectively) have been allotted M-cipher keys 9618; 2903; and
7854 { see 26.1, 27.1 and 28.1 respectively), and have control units 10 ( see Figure 1 ) respectively primed with these keys. The UCI messages for subscribers 1, 2 and 3 might then be 3214; 5587; and 9016, as shown in Figure 2. The station identifier and the time period identifier ana any other relevant information are added to the UCI messages which are then mailed or otherwise transmitted to the individual subscribers. Subscriber number 1 inputs UCI message 3214 and his controi unit uses its unique local M-cipher key 9618 to decipher 3214 to constitute the original V-cipher key 7093 (see 26.2). Similarly the control unit of subscriber number 2 uses its unique M-cipher key 2903 to decipher 5587 to constitute the same original V-cipher key 7093 ( see 27.2), and the control unit of subscriber number 3 uses its unique M-cipher key 7854 to decipher 9016 to constitute the same original V-cipher key 7093 { see 28.2).
It will be appreciated that no M-cipher key information is transmitted with the UCI messages and that the M-cipner keys of two subscribers bear no relationship to one another. The common V-cipher key 7093 generated in each subscriber's control unit can then decipher a programme broadcast in V-enciphered form ( see 24.1 ) in the relevant time period as described above ( see 26.3, 27.3 and 2S.3 respectively).
It will also be appreciated by those skilled in the art that, although the invention has been particularly described m relation to video or television signal scrambling, it is also applicable to the encryption of other forms of broadcast service.

Claims

-11-CT-ATMS:
1. A method of controlling access to a broadcast signal characterised by the method comprising:
issuing a first substantially unique key to each intending user;
issuing to each user to be allowed access a message enciphered by use of the key unique to that user so as to permit local deciphering of the ciphered message by use of the issued first key to constitute a second key; and
broadcasting a signal enciphered by use of said second key so as to permit local deciphering of the ciphered signal by use of the second key.
2. A method of controlling access to a broadcast signal according to Claim 1 characterised in that the ciphered message is embodied in a punched card, a magnetic strip card, a dumb memory card or a smart memory card.
3. A method of gaining local access to a broadcast signal characterised by the method comprising:
locally storing a first substantially unique key;
locally storing first and second deciphering algorithms;
locally entering a ciphered message which has been cipnered at another location by use of said first key;
deciphering said ciphered message by use of said local first key and the first algorithm to constitute a second key; and receiving and deciphering a ciphered broadcast signal by use of said second key and the second algorithm, said broadcast signal having been ciphered at another location by use of a second key.
4. A method of gaining local access to a broadcast signal according to Claim 3 characterised in that the ciphered message is embodied in a punched card, a magnetic strip card, a dumb memory card or a smart memory card.
5. Television receivei* control apparatus characterised in that the apparatus comprises:
memory means for storing a first substantially unique key;
first means for storing a first deciphering algorithm;
second means for storing a second deciphering algorithm;
data entry means for entry of a ciphered message by a user seeking access to a broadcast video signal;
first deciphering means activated by said first key to decipher said ciphered message by use of said first deciphering algorithm whereby the deciphered message constitutes a second key; and
second deciphering means activated by said second key to decipher a received ciphered broadcast video signal by use of said second deciphering algorithm.
6. Television receiver control apparatus according to Claim 5 characterised in that the data entry means is a numerical keyboard or keypad, a slot to accept a coded card, or a modem connected to a telephone line.
PCT/GB1991/000228 1990-02-14 1991-02-14 Apparatus and method for controlling access to broadcast signals WO1991012693A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9003325.9 1990-02-14
GB909003325A GB9003325D0 (en) 1990-02-14 1990-02-14 Apparatus and method for controlling access to broadcast signals

Publications (1)

Publication Number Publication Date
WO1991012693A1 true WO1991012693A1 (en) 1991-08-22

Family

ID=10670966

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1991/000228 WO1991012693A1 (en) 1990-02-14 1991-02-14 Apparatus and method for controlling access to broadcast signals

Country Status (4)

Country Link
EP (1) EP0515448A1 (en)
AU (1) AU7236291A (en)
GB (2) GB9003325D0 (en)
WO (1) WO1991012693A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5835864A (en) * 1991-10-03 1998-11-10 Thomson Consumer Electronics S.A. Method and apparatus for customizing a device with a smart card
EP0695997A3 (en) * 1994-08-01 1999-06-16 AT&T Corp. Methods for providing secure access to shared information
US6636833B1 (en) 1998-03-25 2003-10-21 Obis Patents Ltd. Credit card system and method
US7433845B1 (en) 1999-04-13 2008-10-07 Orbis Patents Limited Data structure, method and system for generating person-to-person, person-to-business, business-to-person, and business-to-business financial transactions
US7840486B2 (en) 1999-01-15 2010-11-23 D Agostino John System and method for performing secure credit card purchases
US10592901B2 (en) 2001-06-04 2020-03-17 Orbis Patents, Ltd. Business-to-business commerce using financial transaction numbers

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07283809A (en) * 1994-04-08 1995-10-27 Mitsubishi Corp Ciphering key system
US6324592B1 (en) 1997-02-25 2001-11-27 Keystone Aerospace Apparatus and method for a mobile computer architecture and input/output management system
US6804357B1 (en) * 2000-04-28 2004-10-12 Nokia Corporation Method and system for providing secure subscriber content data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2132860A (en) * 1982-12-21 1984-07-11 British Broadcasting Corp Conditional-access broadcast transmission
EP0155762A2 (en) * 1984-03-15 1985-09-25 Titan Linkabit Corporation Descrambler subscriber key production system utilizing key seeds stored in descrambler
WO1986006240A1 (en) * 1985-04-12 1986-10-23 Paytel Limited Video transmission system
WO1986007224A1 (en) * 1985-05-24 1986-12-04 Scientific Atlanta, Inc. Method and apparatus for scrambling and descrambling television signals
EP0375539A1 (en) * 1988-12-23 1990-06-27 Laboratoire Europeen De Recherches Electroniques Avancees Method for scrambling and descrambling composite video signals, and apparatus therefor

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4613901A (en) * 1983-05-27 1986-09-23 M/A-Com Linkabit, Inc. Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals
US4696034A (en) * 1984-10-12 1987-09-22 Signal Security Technologies High security pay television system
CA1244090A (en) * 1984-10-26 1988-11-01 General Instrument Corporation Cryptographic system for direct broadcast satellite network
GB2214677B (en) * 1988-01-26 1991-06-26 Philips Electronic Associated Decoding transmitted scrambled signals
US4864615A (en) * 1988-05-27 1989-09-05 General Instrument Corporation Reproduction of secure keys by using distributed key generation data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2132860A (en) * 1982-12-21 1984-07-11 British Broadcasting Corp Conditional-access broadcast transmission
EP0155762A2 (en) * 1984-03-15 1985-09-25 Titan Linkabit Corporation Descrambler subscriber key production system utilizing key seeds stored in descrambler
WO1986006240A1 (en) * 1985-04-12 1986-10-23 Paytel Limited Video transmission system
WO1986007224A1 (en) * 1985-05-24 1986-12-04 Scientific Atlanta, Inc. Method and apparatus for scrambling and descrambling television signals
EP0375539A1 (en) * 1988-12-23 1990-06-27 Laboratoire Europeen De Recherches Electroniques Avancees Method for scrambling and descrambling composite video signals, and apparatus therefor

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5835864A (en) * 1991-10-03 1998-11-10 Thomson Consumer Electronics S.A. Method and apparatus for customizing a device with a smart card
EP0695997A3 (en) * 1994-08-01 1999-06-16 AT&T Corp. Methods for providing secure access to shared information
US8756150B2 (en) 1998-03-25 2014-06-17 Orbis Patents Limited Credit card system and method
US7136835B1 (en) 1998-03-25 2006-11-14 Orbis Patents Ltd. Credit card system and method
US7571142B1 (en) 1998-03-25 2009-08-04 Orbis Patents Limited Credit card system and method
US8676707B2 (en) 1998-03-25 2014-03-18 Orbis Patents Ltd. Credit cards system and method having additional features
US6636833B1 (en) 1998-03-25 2003-10-21 Obis Patents Ltd. Credit card system and method
US9881298B2 (en) 1998-03-25 2018-01-30 Orbis Patents Limited Credit card system and method
US9898730B2 (en) 1998-03-25 2018-02-20 Orbit Patents Limited Credit card system and method
US7840486B2 (en) 1999-01-15 2010-11-23 D Agostino John System and method for performing secure credit card purchases
US7433845B1 (en) 1999-04-13 2008-10-07 Orbis Patents Limited Data structure, method and system for generating person-to-person, person-to-business, business-to-person, and business-to-business financial transactions
US7895122B2 (en) 1999-04-13 2011-02-22 Orbis Patents Limited Person-to-person, person-to business and business-to-business financial transaction system
US10592901B2 (en) 2001-06-04 2020-03-17 Orbis Patents, Ltd. Business-to-business commerce using financial transaction numbers

Also Published As

Publication number Publication date
GB9103138D0 (en) 1991-04-03
GB2241096B (en) 1994-03-23
GB2241096A (en) 1991-08-21
EP0515448A1 (en) 1992-12-02
AU7236291A (en) 1991-09-03
GB9003325D0 (en) 1990-04-11

Similar Documents

Publication Publication Date Title
EP0200310B1 (en) Direct broadcast satellite signal transmission system
EP0950319B2 (en) Preventing replay attacks on digital information distributed by network service providers
US6587561B1 (en) Key delivery in a secure broadcasting system
Tu et al. On key distribution management for conditional access system on pay-TV system
US5345505A (en) Coding system for a data signal
US6385317B1 (en) Method for providing a secure communication between two devices and application of this method
CA1277764C (en) System for enabling descrambling on a selective- subscription basis in a subscriber communication network
US5134656A (en) Pre-payment television system using a memory card associated with a decoder
RU2547446C2 (en) Method of access to services provided by subscriber module
TW554627B (en) Method for operating a conditional access system for broadcast applications
CN1465159B (en) Secure packet-based data broadcasting method, system and client machine used for content data
JP2752979B2 (en) Communication device and communication method
JPS58501982A (en) Protection device for subscriber satellite television encryption
EP1466480A1 (en) Method and system for conditional access
JP4043669B2 (en) Related information processing device in conditional access system
CN100442839C (en) Information transmitting method and apparatus for interactive digital broadcast television system
WO1991012693A1 (en) Apparatus and method for controlling access to broadcast signals
CN100551034C (en) A kind of mobile multi-media service implementation method and condition receiving system
KR20050090399A (en) Method for access control in digital pay television
CN101217358A (en) An activation method of digital broadcast service system and digital broadcast service
CN100544429C (en) A kind of mobile phone TV services content protecting method
JPH10117173A (en) Information distributer and information receiver
CA2467983A1 (en) Method for controlling access to specific services from a broadcaster
GB2241414A (en) Apparatus and method for data communication.
CN1748419B (en) Method of distributing scrambled services and/or data

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AT AU BB BG BR CA CH DE DK ES FI GB HU JP KP KR LK LU MC MG MW NL NO PL RO SD SE SU US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE BF BJ CF CG CH CM DE DK ES FR GA GB GR IT LU ML MR NL SE SN TD TG

WWE Wipo information: entry into national phase

Ref document number: 1991903871

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 1991903871

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: CA

WWW Wipo information: withdrawn in national office

Ref document number: 1991903871

Country of ref document: EP