DieErfindung betrifft ein Verfahren zur Erteilung und zum Entzug derBerechtigung zum Empfang von Rundfunksendungen, die durch Verschlüsselung geschützt sind,mit einem Decoder und einen zur Durchführung des Verfahrens geeignetenDecoder.TheThe invention relates to a method for issuing and withdrawing theAuthorization to receive broadcasts protected by encryption,with a decoder and one suitable for carrying out the methodDecoder.
GebührenpflichtigeRundfunksendungen, die auch unter den Stichworten Pay-TV, Pay-Radio,bekanntgeworden sind, werden mit einem Schlüssel CW verschlüsselt. Benutzerwerden dadurch zum Empfang berechtigt, daß man ihnen den Schlüssel (Kontrollwort)CW vertraulich zukommenläßt. Dazu wirdim allgemeinen dem Benutzer ein persönlicher Schlüssel PKzur Verfügunggestellt, der meist physikalisch gegen Vervielfältigung gesichert, beispielsweiseauf einer Chip-Karte gespeichert ist.PaidBroadcasts, which also include the keywords pay-TV, pay-radio,become known are encrypted with a key CW. userare thereby authorized to receive that one gives them the key (control word)CW confidentially. This will bein general, the user a personal key PKto disposalusually physically secured against duplication, for examplestored on a chip card.
DasKontrollwort CW wird verschlüsseltals Kryptogramm ECM (Entitlement Control Message) über einenDatenkanal des Rundfunksenders vom Empfänger bzw. Decoder empfangen.Durch Entschlüsselungdieses Kryptogramms mit Hilfe des persönlichen Schlüssels PKwird das Kontrollwort CW wiedergewonnen. Bei dem unter dem NamenEuroCrypt bekanntgewordenen System wird ein weiteres KryptogrammEMM (Entitlement Management Message) eines Schlüssels SK gesendet. Dieses Kryptogrammkann mit Hilfe von PK entschlüsseltwerden. Der so erhaltene SchlüsselSK dient zur Berechnung von CW aus dem Kryptogramm ECM. Dieses Zugangskontrollsystemist in DIN EN 50094 beschrieben. Sicherheitshalber wird der Schlüssel CWhäufig gewechselt.TheControl word CW is encryptedas a cryptogram ECM (Entitlement Control Message) over aData channel of the radio station from the receiver or decoder received.By decryptionthis cryptogram by means of the personal key PKthe control word CW is retrieved. When under the nameEuroCrypt became known system becomes another cryptogramEMM (Entitlement Management Message) of a SK key sent. This cryptogramcan be decrypted with the help of PKbecome. The key thus obtainedSK is used to calculate CW from the cryptogram ECM. This access control systemis described in DIN EN 50094. For safety's sake, the key is CWchanged frequently.
Einewichtige Aufgabe des Zugangskontrollsystems besteht darin, Benutzern,die ihre Gebühren nichtbezahlt haben, die Berechtigung zum Empfang der Rundfunksendungzu entziehen. Dieses kann einerseits durch eine negative Adressierunggeschehen, bei welchem an den Decoder eine Nachricht geschickt wird,in welcher dieser aufgefordert wird, seine Tätigkeit einzustellen. DieseMöglichkeitist jedoch grundsätzlichunsicher, da derartige Nachrichten von einem betrügerischenBenutzer abgefangen werden könnenund damit unwirksam sind.Aimportant task of the access control system is to provide users,not their feeshave paid the permission to receive the broadcastto withdraw. This can on the one hand by a negative addressinghappen at which a message is sent to the decoder,in which he is asked to cease his activity. Thesepossibilityis however basicallyunsure, as such news of a fraudulentUsers can be interceptedand thus ineffective.
Beider positiven Adressierung wird eine Abschaltung des Decoders dadurchbewirkt, daß diein ihm enthaltene Information wertlos gemacht wird. Das geschiehtdadurch, daß alleanderen Decoder neue Informationen erhalten, die zum Entschlüsseln zukünftigerRundfunksendungen unbedingt gebraucht werden, nur der abzuschaltendeDecoder nicht.atthe positive addressing will disable the decodercauses theinformation contained in it is made worthless. This happensin that allother decoders receive new information that will help decipher future onesIt is absolutely necessary to use radio broadcasts, only the one to be switched offDecoder not.
DasVerfahren der positiven Adressierung führt zwar mit Sicherheit zurAbschaltung des Decoders des jeweiligen Benutzers, es ist allerdingsmit großemAufwand verbunden, da zum Abschalten eines Decoders Nachrichtenan alle anderen Decoder gesendet werden müssen.TheAlthough the method of positive addressing certainly leads toDisconnecting the decoder of each user, it is, howeverwith bigExpenses connected because to turn off a decoder messagesmust be sent to all other decoders.
Durch
DerErfindung liegt die Aufgabe zugrunde, ein Verfahren zur Erteilungund zum Entzug der Berechtigung zum Empfang von Rundfunksendungen vorzuschlagen,bei welchem die zur Entschlüsselung erforderlichenInformationen in einem bestimmten Decoder wertlos gemacht werdenkönnen,ohne daß alleanderen Decoder einzeln adressiert werden müssen.Of theInvention is based on the object, a method for issuingand to propose the withdrawal of the right to receive broadcasts,where required for decryptionInformation in a particular decoder be made worthlesscan,without allother decoders must be addressed individually.
DieseAufgabe wird mit dem erfindungsgemäßen Verfahren gelöst,
Bei1.000.000 Decodern müßten beidem eingangs erwähntenVerfahren 999.999 Nachrichten übertragenwerden, um einen der Decoder zu deaktivieren. Bei dem erfindungsgemäßen Verfahrenmit beispielsweise einem 2-ärenBaum der Tiefe 20 sind etwa nur 40 Nachrichten notwendig.With 1,000,000 decoders 999,999 messages would have to be transmitted in the process mentioned above to deactivate one of the decoders four. In the method according to the invention with, for example, a 2-ary tree of depth 20, only about 40 messages are necessary.
ZurVerschlüsselungder Daten könnenbei dem erfindungsgemäßen Verfahrensowohl symmetrische als auch asymmetrische Verfahren angewendetwerden.toencodingthe data canin the method according to the inventionBoth symmetric and asymmetric methods are usedbecome.
Einevorteilhafte Ausführungsformdes erfindungsgemäßen Verfahrensbesteht darin, daß die Baumstrukturm-regulärist, wobei mt ≥ n gilt mit m = Zahl der einemKnoten oder der Wurzel nachfolgenden Knoten, t = Zahl der von Knotengebildeten Ebenen und n = Zahl der Decoder. Dadurch ist eine einfacheZuordnung der Kryptogramme, welche Änderungen der gespeichertenSchlüsselbewirken, möglich.An advantageous embodiment of the method according to the invention is that the tree structure is m-regular, where mt ≥ n with m = number of nodes following a node or root, t = number of levels formed by nodes, and n = number of decoders , As a result, a simple assignment of the cryptograms, which cause changes to the stored keys, possible.
ZumEntzug der Berechtigung eines bestimmten Decoders kann bei dem erfindungsgemäßen Verfahrenvorgesehen sein, daß
Einvorteilhafter Decoder zur Durchführung desVerfahrens nach einem der vorhergehenden Ansprüche ist dadurch gekennzeichnet,daß mehrere Schlüssel speicherbarsind, wobei mindestens ein Teil der Schlüssel durch mit den Rundfunksendungen empfangeneKryptogramme, die mit Hilfe eines der gespeicherten Schlüssel entschlüsselbarsind, veränderbarsind.Oneadvantageous decoder for carrying out theMethod according to one of the preceding claims, characterizedthat several keys storablewhere at least part of the keys are received by the broadcastsCryptograms that can be decrypted using one of the stored keysare, changeableare.
EinAusführungsbeispielder Erfindung ist in der Zeichnung anhand mehrerer Figuren dargestellt undin der nachfolgenden Beschreibung näher erläutert. Es zeigt:Oneembodimentthe invention is illustrated in the drawing with reference to several figures andexplained in more detail in the following description. It shows:
EinemDecoder mit dem SchlüsselK(m, x) – beimin
Zeilea der
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE1995111298DE19511298B4 (en) | 1995-03-28 | 1995-03-28 | Procedure for issuing and revoking the authorization to receive broadcasts and decoders |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE1995111298DE19511298B4 (en) | 1995-03-28 | 1995-03-28 | Procedure for issuing and revoking the authorization to receive broadcasts and decoders |
| Publication Number | Publication Date |
|---|---|
| DE19511298A1 DE19511298A1 (en) | 1996-10-02 |
| DE19511298B4true DE19511298B4 (en) | 2005-08-18 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| DE1995111298Expired - LifetimeDE19511298B4 (en) | 1995-03-28 | 1995-03-28 | Procedure for issuing and revoking the authorization to receive broadcasts and decoders |
| Country | Link |
|---|---|
| DE (1) | DE19511298B4 (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE19630707A1 (en)* | 1996-07-30 | 1998-02-05 | Deutsche Telekom Ag | Procedures and arrangements to avoid unauthorized use of distribution networks |
| DE19649292A1 (en)* | 1996-11-28 | 1998-06-04 | Deutsche Telekom Ag | Access protection method for pay television |
| ATE429748T1 (en) | 1998-01-02 | 2009-05-15 | Cryptography Res Inc | LEAK RESISTANT CRYPTOGRAPHIC METHOD AND APPARATUS |
| US7587044B2 (en) | 1998-01-02 | 2009-09-08 | Cryptography Research, Inc. | Differential power analysis method and apparatus |
| EP1090480B1 (en) | 1998-06-03 | 2019-01-09 | Cryptography Research, Inc. | Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems |
| DE69935913T2 (en) | 1998-07-02 | 2008-01-10 | Cryptography Research Inc., San Francisco | LACK RESISTANT UPGRADE OF AN INDEXED CRYPTOGRAPHIC KEY |
| EP0987893A1 (en)* | 1998-09-16 | 2000-03-22 | CANAL+ Société Anonyme | Management of data in a receiver/decoder |
| DE19847941A1 (en) | 1998-10-09 | 2000-04-13 | Deutsche Telekom Ag | Common cryptographic key establishment method for subscribers involves successively combining two known secret values into a new common value throughout using Diffie-Hellmann technique |
| EP1075108A1 (en)* | 1999-07-23 | 2001-02-07 | BRITISH TELECOMMUNICATIONS public limited company | Cryptographic data distribution |
| JP4370721B2 (en)* | 2000-04-06 | 2009-11-25 | ソニー株式会社 | Information recording apparatus, information reproducing apparatus, information recording method, information reproducing method, key update terminal apparatus, generation management key update method, information recording medium, and program providing medium |
| JP4023083B2 (en)* | 2000-04-06 | 2007-12-19 | ソニー株式会社 | Information processing system, information processing method, information recording medium, and program providing medium |
| JP4622064B2 (en)* | 2000-04-06 | 2011-02-02 | ソニー株式会社 | Information recording apparatus, information reproducing apparatus, information recording method, information reproducing method, information recording medium, and program providing medium |
| JP2001352321A (en) | 2000-04-06 | 2001-12-21 | Sony Corp | Information processing system, information processing method, and information recording medium, and program providing medium |
| DE60135681D1 (en) | 2000-06-21 | 2008-10-16 | Sony Corp | Device and method for key renewal in a hierarchical tree key structure |
| CN100401667C (en) | 2000-06-21 | 2008-07-09 | 索尼公司 | Information recording/reproducing device and method |
| JP4660899B2 (en) | 2000-07-24 | 2011-03-30 | ソニー株式会社 | Data processing apparatus, data processing method, and program providing medium |
| JP4608749B2 (en)* | 2000-07-24 | 2011-01-12 | ソニー株式会社 | Data processing apparatus, data processing method, license system, and program providing medium |
| DE10038068A1 (en)* | 2000-08-04 | 2002-02-14 | Deutsche Telekom Ag | Process for the transmission of data |
| US20020076204A1 (en)* | 2000-12-18 | 2002-06-20 | Toshihisa Nakano | Key management device/method/program, recording medium, reproducing device/method, recording device, and computer-readable, second recording medium storing the key management program for copyright protection |
| JP2002319932A (en) | 2001-04-19 | 2002-10-31 | Sony Corp | Device and method for recording information, device and method for reproducing information, and program |
| JP2005530396A (en)* | 2002-06-17 | 2005-10-06 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Authentication system between devices using group certificate |
| EP1575292A1 (en)* | 2004-03-10 | 2005-09-14 | Nagracard S.A. | Method of securing a scrambled content sent by a broadcaster |
| DE102004042094B3 (en)* | 2004-08-30 | 2005-09-22 | RUHR-UNIVERSITäT BOCHUM | Digital data transmission method such as for pay TV using a single use code |
| WO2007059807A1 (en)* | 2005-11-22 | 2007-05-31 | Nero Ag | Apparatus and method for retrieving a decryption key, license server and media player |
| FR2905217B1 (en)* | 2006-08-23 | 2008-12-19 | Thales Sa | SYSTEM AND METHOD FOR DECENTRALIZED MANAGEMENT OF A SECURE SYSTEM DELIVERING DIFFERENT SERVICES |
| JP2009118529A (en)* | 2009-02-25 | 2009-05-28 | Deutsche Telekom Ag | Method of securely protecting system protected by key layer |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4309569A (en)* | 1979-09-05 | 1982-01-05 | The Board Of Trustees Of The Leland Stanford Junior University | Method of providing digital signatures |
| DE3325858A1 (en)* | 1982-07-23 | 1984-01-26 | Oak Industries Inc., Rancho Bernardo, Calif. | MULTI-LAYER ENCRYPTION SYSTEM FOR SENDING ENCRYPTED INFORMATION |
| EP0132401A2 (en)* | 1983-07-21 | 1985-01-30 | Kabushiki Kaisha Toshiba | Information transmission system |
| DE3524472A1 (en)* | 1984-07-09 | 1986-01-16 | Kabushiki Kaisha Toshiba, Kawasaki, Kanagawa | TRANSMITTER / RECEIVER FOR ENCRYPTED SIGNALS |
| US4661658A (en)* | 1985-02-12 | 1987-04-28 | International Business Machines Corporation | Offline PIN validation with DES |
| DE3717022A1 (en)* | 1987-05-21 | 1988-12-15 | Thomson Brandt Gmbh | DATA TRANSFER SYSTEM |
| DE3802612C1 (en)* | 1988-01-29 | 1989-08-17 | Prof. Dr. Bruckschen & Partner Gmbh, 4130 Moers, De | System for charging for television programmes and the like |
| US4881264A (en)* | 1987-07-30 | 1989-11-14 | Merkle Ralph C | Digital signature system and method based on a conventional encryption function |
| JPH0288859A (en)* | 1988-09-26 | 1990-03-29 | Hitachi Maxell Ltd | IC card entry/exit management system |
| DE3827172C2 (en)* | 1987-08-13 | 1990-05-03 | Peter 8000 Muenchen De Elsner | |
| EP0287720B1 (en)* | 1987-04-22 | 1992-01-08 | International Business Machines Corporation | Management of cryptographic keys |
| US5202921A (en)* | 1991-04-01 | 1993-04-13 | International Business Machines Corporation | Method and apparatus for authenticating users of a communication system to each other |
| US5231666A (en)* | 1992-04-20 | 1993-07-27 | International Business Machines Corporation | Cryptographic method for updating financial records |
| JPH05327748A (en)* | 1992-05-27 | 1993-12-10 | Fujitsu Ltd | Multi-address communication system |
| FR2696567A1 (en)* | 1992-10-02 | 1994-04-08 | Gemplus Card Int | Encryption and processing of signals from smart card - using value determined by traversal of tree determined by repeated processing of original data, as key |
| JPH06274398A (en)* | 1993-03-24 | 1994-09-30 | Toshiba Corp | File management method |
| EP0641103A2 (en)* | 1993-08-25 | 1995-03-01 | ALGORITHMIC RESEARCH Ltd. | Method and apparatus for key distribution in a selective braodcasting system |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4309569A (en)* | 1979-09-05 | 1982-01-05 | The Board Of Trustees Of The Leland Stanford Junior University | Method of providing digital signatures |
| DE3325858A1 (en)* | 1982-07-23 | 1984-01-26 | Oak Industries Inc., Rancho Bernardo, Calif. | MULTI-LAYER ENCRYPTION SYSTEM FOR SENDING ENCRYPTED INFORMATION |
| EP0132401A2 (en)* | 1983-07-21 | 1985-01-30 | Kabushiki Kaisha Toshiba | Information transmission system |
| DE3524472A1 (en)* | 1984-07-09 | 1986-01-16 | Kabushiki Kaisha Toshiba, Kawasaki, Kanagawa | TRANSMITTER / RECEIVER FOR ENCRYPTED SIGNALS |
| US4661658A (en)* | 1985-02-12 | 1987-04-28 | International Business Machines Corporation | Offline PIN validation with DES |
| EP0287720B1 (en)* | 1987-04-22 | 1992-01-08 | International Business Machines Corporation | Management of cryptographic keys |
| DE3717022A1 (en)* | 1987-05-21 | 1988-12-15 | Thomson Brandt Gmbh | DATA TRANSFER SYSTEM |
| US4881264A (en)* | 1987-07-30 | 1989-11-14 | Merkle Ralph C | Digital signature system and method based on a conventional encryption function |
| DE3827172C2 (en)* | 1987-08-13 | 1990-05-03 | Peter 8000 Muenchen De Elsner | |
| DE3802612C1 (en)* | 1988-01-29 | 1989-08-17 | Prof. Dr. Bruckschen & Partner Gmbh, 4130 Moers, De | System for charging for television programmes and the like |
| JPH0288859A (en)* | 1988-09-26 | 1990-03-29 | Hitachi Maxell Ltd | IC card entry/exit management system |
| US5202921A (en)* | 1991-04-01 | 1993-04-13 | International Business Machines Corporation | Method and apparatus for authenticating users of a communication system to each other |
| US5231666A (en)* | 1992-04-20 | 1993-07-27 | International Business Machines Corporation | Cryptographic method for updating financial records |
| JPH05327748A (en)* | 1992-05-27 | 1993-12-10 | Fujitsu Ltd | Multi-address communication system |
| FR2696567A1 (en)* | 1992-10-02 | 1994-04-08 | Gemplus Card Int | Encryption and processing of signals from smart card - using value determined by traversal of tree determined by repeated processing of original data, as key |
| JPH06274398A (en)* | 1993-03-24 | 1994-09-30 | Toshiba Corp | File management method |
| EP0641103A2 (en)* | 1993-08-25 | 1995-03-01 | ALGORITHMIC RESEARCH Ltd. | Method and apparatus for key distribution in a selective braodcasting system |
| Title |
|---|
| SANTOSH,CHOKHANI: Toward a National Public Key Infrastructure. In: IEEE Communications Magazine, Sept. 1994, S.70-74* |
| Publication number | Publication date |
|---|---|
| DE19511298A1 (en) | 1996-10-02 |
| Publication | Publication Date | Title |
|---|---|---|
| DE19511298B4 (en) | Procedure for issuing and revoking the authorization to receive broadcasts and decoders | |
| DE3750724T2 (en) | METHOD AND DEVICE FOR TRANSMITTING VIDEO, AUDIO, TELETEXT AND DATA TO GROUPS OF DECODERS IN A TRANSMISSION SYSTEM. | |
| DE3325858C2 (en) | Method for controlling the simultaneous general transmission of encrypted digital information signals and receiver for such signals | |
| DE69715535T2 (en) | Conditional access system and associated card | |
| DE69312828T2 (en) | Access control procedures | |
| DE69610343T2 (en) | Pay TV procedure | |
| DE69019203T2 (en) | Controlled decryption of encrypted programs that are transferred between different areas of responsibility. | |
| EP1040662B1 (en) | Method for securing a system protected by key hierarchy | |
| DE69902527T3 (en) | ADJUSTMENT DEVICE BETWEEN A RECEIVER AND A SAFETY MODULE | |
| DE60131270T2 (en) | Time Valid reasoning system | |
| DE69702310T2 (en) | METHOD FOR SECURE TRANSFER BETWEEN TWO DEVICES AND THE USE THEREOF | |
| DE69737804T2 (en) | Conditional access system using messages with multiple encryption keys | |
| DE2439116C2 (en) | Method and arrangement for distorting and equalizing television signals | |
| DE3124150C2 (en) | Method for encrypting and transmitting information and decrypting the same | |
| EP0835564B1 (en) | Method and arrangement for the transmitter-related detection of listener-related data | |
| DE69912550T2 (en) | Method and system for the controlled delivery of digital multimedia services | |
| DE69910786T2 (en) | Methods of distributing keys to a number of secured devices, methods of communication between a number of secured devices, security system, and set of secured devices | |
| DE68903995T2 (en) | METHOD FOR SENDING AND RECEIVING REPORTS FOR MANAGING ENTRY NAMES. | |
| DE602004003346T2 (en) | PAY TELEVISION, METHOD FOR REMOVING RIGHTS IN SUCH A SYSTEM, ASSOCIATED DECODER AND CHIP CARD, AND MESSAGE TRANSMITTED TO SUCH A DECODER | |
| DE68921316T2 (en) | Method for encrypting and decrypting composite video signals and device for carrying out this method. | |
| DE2550624C3 (en) | Transmission method for interactive message or data services of a broadband communication system | |
| EP0187973A2 (en) | Method and circuit arrangement for the prevention of unauthorised reception of scrambled television signals | |
| EP0027572A1 (en) | Method and apparatus for ciphered transmission of information | |
| WO2002013453A2 (en) | Method for data transmission using a tree structure having associated keys | |
| DD295477A5 (en) | METHOD AND DEVICE FOR TRANSMITTING INFORMATION BY ELECTROMAGNETIC WAVES |
| Date | Code | Title | Description |
|---|---|---|---|
| OM8 | Search report available as to paragraph 43 lit. 1 sentence 1 patent law | ||
| 8110 | Request for examination paragraph 44 | ||
| 8364 | No opposition during term of opposition | ||
| R071 | Expiry of right | ||
| R071 | Expiry of right |