WO1988006826A1 - Access systems - Google Patents

Access systems Download PDF

Info

Publication number
WO1988006826A1
WO1988006826A1 PCT/GB1988/000151 GB8800151W WO8806826A1 WO 1988006826 A1 WO1988006826 A1 WO 1988006826A1 GB 8800151 W GB8800151 W GB 8800151W WO 8806826 A1 WO8806826 A1 WO 8806826A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
access
security code
sub
operable
Prior art date
Application number
PCT/GB1988/000151
Other languages
French (fr)
Inventor
James Joseph Armour
Andrew Jim Kelley Glasspool
Original Assignee
Mars Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mars Incorporated filed Critical Mars Incorporated
Publication of WO1988006826A1 publication Critical patent/WO1988006826A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/28Coin-freed apparatus for hiring articles; Coin-freed facilities or services for radio apparatus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/127Shopping or accessing services according to a time-limitation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/0014Coin-freed apparatus for hiring articles; Coin-freed facilities or services for vending, access and use of specific services not covered anywhere else in G07F17/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2543Billing, e.g. for subscription services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/426Internal components of the client ; Characteristics thereof
    • H04N21/42684Client identification by a unique number or address, e.g. serial number, MAC address, socket ID
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8355Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence

Definitions

  • This invention relates to access systems in which access, e.g. to a service, a product or a location, is gained by means of an electronic key storing a security code.
  • the invention is particularly but not exclusively concerned with conditional access television systems, e.g. for satellite broadcasting systems.
  • Figure 4 on page 382 illustrates one such system, in which a transmitter transmits scrambled television picture and sound signals and encrypted control signals.
  • the control signals are decrypted and used for descrambling the picture and sound signals.
  • Decryption is carried out in a detachable sub-system (also referred to herein as a key).
  • the sub-system stores a distribution key (also referred to herein as a security code) and a validation code which are combined to form an authorisation key used for decryption.
  • the authorisation key corresponds to the one used in the transmitter for encrypting the control s ignals .
  • Each user would have a different distribution key stored in his detachable sub-system.
  • the control computer alters the authorisation key, and, for each user who has paid his subscription, calculates a validation code from the new authorisation key and the user's distribution key.
  • This validation code is broad ⁇ cast, and the user's detachable sub-system receives and stores the validation code. Accordingly, anyone who Sails to pay his subscription will not have his valid ⁇ ation code renewed when the authorisation key is changed, and therefore the sub-system will no longer be able to decrypt the control signals so that the picture and sound signals cannot be unscrambled.
  • Such an arrangement requires transmission of a large number of codes, and thus if there are many subscribers a large bandwidth is needed.
  • each detachable sub-system has a stored credit value and a stored expiry date. Instead of paying subscriptions, a user will pay for the services by buying a sub-system. As the sub ⁇ system is used, the stored credit value is decreased. When it reaches zero, or the expiry date is reached, the sub-system can- no longer be used. The article states that this system does not require the use of validation codes. Both the above techniques are subject to fraud, particularly by means of copyi-ng the sub-systems. It i s proposed to mitigate this problem by making the sub ⁇ systems detachable and issuing new sub-systems when fraud is detected. However, this is an expensive solution, and it would not always be apparent when replacement of sub ⁇ systems is required.
  • a key for a controlled access system is operable to produce a security code to be used in determining whether access is provided to the system, wherein the key is operable to produce a different security code after a selected time.
  • the key which for example could be detachable, and which could form a sub-system for a controlled access pre-payment television system, may be arranged so that the produced security code varies depending upon the current time (e.g. in dependence upon the date).
  • the current time may be determined by signals generated by the television receiver, or by signals transmitted with a television signal.
  • the security codes being produced by all keys or sub-systems for decrypting control signals used for descra bling television signals, and the code used by the transmitter to encrypt such control signals, would change in synchronism.
  • the invention is preferably embodied in a pre ⁇ payment system. If the system does not require the transmission of validation codes, the arrangement may be such that, at any given time, all the sub-systems used for receiving a particular broadcasting service generate the same security code.
  • the invention also extends to systems which use transmitted validation codes, e.g. subscription systems.
  • Each sub-system may have a unique identity code, so that validation codes can be transmitted individually to the different sub-systems.
  • the validation code and the stored security code are used together to form an authorisation key to enable access (e.g. to enable de-scrambling of broadcast signals).
  • the sub-system is only effective for a limited duration, it is no longer necessary for the system to transmit signals to the individual sub-systems in order to maintain them operational and, the end of the subscription, to disable them. Instead, the sub-system automatically remains operational throughout the subscription period, and is automatically disabled at the end of the subscription by virtue of the fact that it will no longer store a security code appropriate for the current date. This substantially reduces the number of validation signals which need to be transmitted, and thus the bandwidth requirements are relaxed.
  • an access system comprises a plurality of sub-systems, each storing a security code and each arranged to receive a validation code, each sub-system being operable to permit access on condition that an authorisation key derived from the validation code and the security code is deemed appropriate, wherein the sub ⁇ systems are divided into groups according to expiry date, and wherein sub-systems within a group having a common expiry date also have a common security code.
  • the number of signals needed to be transmitted can be greatly reduced as compared with the prior art.
  • only a single validation code is transmitted for each user in order to render his sub ⁇ system operational.
  • Further validation signals may be directed to the sub-system, e.g. to maintain it operational and/or to disable it at the expiry date, but the same signals would be used by other sub-systems in the same group, and therefore the total number of different signals needed to be transmitted is greatly reduced.
  • any signal which is transmitted is desirably repeated at intervals over a period to ensure that it has been received properly by all the sub-systems to which it is directed.
  • this operation it is not necessary for this operation to be performed at regular intervals in order to maintain individual sub-systems operational throughout the subscription period and individually to disable the sub-systems at the end of the subscription period.
  • FIG. 1 is a schematic block diagram of an access system in accordance with the invention.
  • picture signals delivered along a path 4 are scrambled by a picture signal scrambler 6 and then delivered to a transmitter 8.
  • the transmitted signals are received by a receiver 10 which then delivers the scrambled picture signals to a descra bler 12.
  • the descrambled picture signals are then presented to a display 14.
  • the scrambler 6 scrambles the signals according to a code generated by a scrambling controller 16.
  • the code is also delivered to an encrypter 18, which encrypts the codes in accordance with an authorisation key received from a control computer 20.
  • the encrypted codes form control signals which are delivered to transmitter 8 and transmitted along with the transmitted picture signal.
  • a receiver 10 separates the encrypted control signals from the picture signals and delivers them to a key or sub-system 22.
  • the control signals are delivered to a decrypter 24, in which they are decrypted in accordance with an access signal in the form of an authorisation key received from a sub-system controller 26.
  • the authorisation key generated by the sub-system controller 26 should correspond to that generated by the control computer 20, and hence the control signals can be decrypted by the decrypter 24, whereby they can be used by the descrambler 12 in order to descramble the picture signals.
  • sound signals can be treated in the same way.
  • the control computer 20 receives a signal indicative of the current time and date from a clock 28. This signal is used to determine which address in a memory 30 is accessed in order to obtain the authorisation key sent to the encrypter 18.
  • the memory 30 stores- substantial number of authorisation keys which are used in succession. By way of example, a new authorisation key may be used once a month.
  • a signal indicative of the current time is delivered to the controller 26 on line 31.
  • This signal may be generated by a clock in the receiving installation, or may be derived from signals transmitted by the transmitter 8.
  • the controller 26 uses the time signal to determine which location in an author ⁇ isation key store 32 is read to derive the authorisation key sent to the decrypter 24.
  • the memory 32 stores a limited number of authorisation keys corresponding to those generated by the computer 20 over a limited period. Accordingly, once this period has expired, the sub-system 22 is no longer operable to enable correct descrambling of the picture signals.
  • the period over which the sub-system 22 is useful is governed solely by what authorisation keys are stored in memory 32.
  • the sub-system 22 stores further information which places additional restrictions on the useful life of the sub-system 22.
  • This further information may also be contained in the memory 32, and may include any or all of the following: (1) An expiry date.
  • the controller 26 can compare this with the current date and not permit accessing of an author sa ion key if the current date is later than the expiry date.
  • the controller 26 would compare this with the current time, and prevent the reading out of authorisation keys if the current time is prior to the start date.
  • the start date could be programmed into the sub-system by the supplier.
  • the controller would check whether the sub-system has been used for a period longer than the lifespan, and if so would prevent reading out of the authorisation keys- To achieve this, the sub ⁇ system would record the time at which it was first used. This could be accomplished by using the programmed start date referred to in paragraph (2). Alternatively, the sub-system could be arranged automatically to record the time at which it is first used.
  • the sub-system could contain author ⁇ isation keys suitable for a period of 15 months, together with a lifespan of 12 months. This would allow the sub ⁇ system to have a shelf life of 3 months within which it could be purchased and still provide 12 months of use. If the lifespan, start date, and/or expiry date are programmable by the supplier he will be able to determine the periods for which the sub-system may be used. These parameters are preferably stored in the form of units corres ponding to the period between changes in authorisation key by the control computer 20. For example the start date could be recorded as the value "4" if the first authorisation key to be used by the sub-system is that corresponding to the fourth time period for which the authorisation keys stored in memory 32 are valid.
  • a system according to the present invention has the advantage over the prior art pre-payment system described above, in that there is a risk that the prior art system could be "fooled” into thinking that the expiry date has not yet been reached by interfering with the signals supplied to the sub-system which are intended to indicate the current time. In the present system, this would result in the sub-system producing the wrong security code, so that fraudulent reception of the service could not be achieved by this means.
  • means are preferably provided to determine whether an authorisation key is valid so that the controller 26 could perform a search operation in which authorisation keys are successiveively selected until the correct one is chosen. To this end, an encrypted version of the correct authorisation key could be transmitted, and the sub ⁇ system could compare the decrypted version with its generated authorisation key to determine if the latter is valid.
  • a different authorisation key could be selected in response to a command broadcast by the transmitter 8. Accordingly, if it is found that the security system has been breached and that fraudulent access is being gained to the system, the security codes can be changed without requiring the users' sub-systems to be returned to a distributor and without requiring new sub-systems to be issued.
  • the key may be arranged to look up the security code (or a value which is used to calculate the security code) in a stored table, the look up location being determined at least in part by the current time.
  • the key could be arranged to generate the security code using an algorithm dependent at least in part upon the current time. It is however preferred that the security codes be produced using a look-up table, because using an algorithm to generate the security codes results in a risk that the algorithm will be discovered to enable the fraudulent generation of security codes.
  • the authorisation key sent by the controller 26 to ' the decrypter 24 is determined in dependence on both a security code accessed from the memory 32 and a validation code stored in a further memory 34.
  • This validation code has been derived from the control signals transmitted by the transmitter 8.
  • the validation codes are transmitted to. individual sub-systems. For this purpose they are transmitted along with addresses which correspond to unique identification numbers stored in the sub-systems. Accordingly, as is per se known in the art, the memory 3 ⁇ will receive only the validation code which is appropriate for the particular sub-system for which it is installed.
  • the validation code is generated by the control computer 20 prior to transmission, and for this purpose a database 36 storing customer details and sub-system identification numbers is used.
  • the sub-systems can be arranged in groups sharing a common security code.
  • the sub-systems are divided into groups according to expiry date, and sub-systems within the same group use a common security code at any given time.
  • the security code is combined with a validation code stored in the memory 3 to generate the authorisation key.
  • An individual validation code is transmitted to a user when he first starts to use the sub-system to render his sub-system operational. Thereafter group messages are sent at regular intervals to all sub-systems having the same expiry date to maintain them operational, e.g. by transmitting the validation code appropriate for the next period.
  • the messages are the same for all sub-systems within the group, and different from those sent to other groups. As the expiry date for a group approaches, no further enabling messages are sent to that group.
  • sub-systems could be divided or sub ⁇ divided geographically, such that sub-systems for use in the same geographical area have the same security code.
  • each instead of all sub ⁇ systems storing corresponding tables of security codes, each stores only a single security code which is common to the group.
  • the sub-systems described above could be easily modified to store a conventional security code in addition to the security codes referred to above so that the same sub-system can be used in a conventional manner for reception of one channel and in one of the ways described above for reception of another channel.
  • validation codes can contain information used to control the manner in which access is provided. For example, they could control which channels the sub-system is enabled for, and specific periods within which to enable them. Alternatively, they could contain keys used to decipher transmitted control signals determining the manner of access.
  • the decrypter 24 shown in Figure 1 could alternatively lie outside the sub-system 22.
  • the sub-system should provide a signal in dependence upon whether there is any remaining credit stored in the sub-system, and an enabling signal which is used only if the credit-indicating signal is present for enabling access, e.g. by descrambling broadcast tele ⁇ vision systems.
  • a conditional access system in which a key or sub-system is operable to generate enabling signals for enabling access only on condition that the sub-system stores a credit value.
  • the sub-system 22 of Figure 1 stores a credit value (e.g.
  • the sub-system 22 is shown in Figure 1 as having several functional blocks, including controller 26, decrypter 24, memory 32 and, optionally, memory 34. Although each of these blocks can be formed by respective circuits, it is preferred that the sub-system be formed by a microprocessor having a single memory and arranged to perform all the necessary functions. Thus, the access signal could be a multi-bit word transmitted to a decrypter, or could simply be a stored data value used by the microprocessor in performing a decryption function.
  • control signals may be generated locally, rather than being broadcast by the television signal transmitter, or the signals frbm the sub-system could be used directly for descrambling television signals rather than decrypting control signals which are then used for descrambling.
  • the authorisation keys produced by the sub-system may be used for other purposes than descrambling.
  • the invention is useful also in terrestrial broadcasting and cable systems.
  • the invention is also applicable to systems other than broadcasting systems.
  • the system could be used for controlling access to buildings, computers e.t.c. It is particularly useful where access is dependent upon the current time, e.g. for shift workers, because the security code produced by the key may be selected according to the current time.
  • the key or sub-system described above be detachable, and preferably portable.
  • Devices which are particularly suitable for use as the key are the tokens described in published patent applications.GB- A-2153128 and GB-A-2196450 and GB patent application 8626233- However, some aspects of the invention are useful also with non-detachable sub-systems.

Abstract

In an access system, preferably a conditional access TV broadcasting system, a key in a receiver stores a table of security codes and at pre-determined times starts to use a new one of the codes in order to generate an authorisation key for permitting access. The key also preferably stores a start time indicative of the first time that the key was used, and a lifespan indicative of the total duration for which it may be used. The lifespan is preferably shorter than the total period for which the stored security codes are valid.

Description

ΛCCESS SYSTEMS
This invention relates to access systems in which access, e.g. to a service, a product or a location, is gained by means of an electronic key storing a security code. The invention is particularly but not exclusively concerned with conditional access television systems, e.g. for satellite broadcasting systems.
Various proposals for conditional access television systems are described in the Journal of the Institution of Electronic and Radio Engineers, Vol. 55, No. 11/12, pp.377 to 385, November/December 1985. Figure 4 on page 382 illustrates one such system, in which a transmitter transmits scrambled television picture and sound signals and encrypted control signals. In the receiver, the control signals are decrypted and used for descrambling the picture and sound signals. Decryption is carried out in a detachable sub-system (also referred to herein as a key). The sub-system stores a distribution key (also referred to herein as a security code) and a validation code which are combined to form an authorisation key used for decryption. The authorisation key corresponds to the one used in the transmitter for encrypting the control s ignals .
Each user would have a different distribution key stored in his detachable sub-system. Periodically, the control computer alters the authorisation key, and, for each user who has paid his subscription, calculates a validation code from the new authorisation key and the user's distribution key. This validation code is broad¬ cast, and the user's detachable sub-system receives and stores the validation code. Accordingly, anyone who Sails to pay his subscription will not have his valid¬ ation code renewed when the authorisation key is changed, and therefore the sub-system will no longer be able to decrypt the control signals so that the picture and sound signals cannot be unscrambled. Such an arrangement requires transmission of a large number of codes, and thus if there are many subscribers a large bandwidth is needed.
The above article also describes on page 384 an alternative pre-payment system, in which each detachable sub-system has a stored credit value and a stored expiry date. Instead of paying subscriptions, a user will pay for the services by buying a sub-system. As the sub¬ system is used, the stored credit value is decreased. When it reaches zero, or the expiry date is reached, the sub-system can- no longer be used. The article states that this system does not require the use of validation codes. Both the above techniques are subject to fraud, particularly by means of copyi-ng the sub-systems. It is proposed to mitigate this problem by making the sub¬ systems detachable and issuing new sub-systems when fraud is detected. However, this is an expensive solution, and it would not always be apparent when replacement of sub¬ systems is required.
According to one aspect of the present invention, a key for a controlled access system is operable to produce a security code to be used in determining whether access is provided to the system, wherein the key is operable to produce a different security code after a selected time. The key, which for example could be detachable, and which could form a sub-system for a controlled access pre-payment television system, may be arranged so that the produced security code varies depending upon the current time (e.g. in dependence upon the date). The current time may be determined by signals generated by the television receiver, or by signals transmitted with a television signal.
By periodically changing the security code, the opportunity for anyone fraudulently to copy the key is reduced, and the value of the copy is reduced because the key will no longer be effective after the time at which the security code is due to change. In such a system, it is envisaged that at predeter¬ mined times, preferably separated by at least a day, and more preferably several days, the security codes being produced by all keys or sub-systems for decrypting control signals used for descra bling television signals, and the code used by the transmitter to encrypt such control signals, would change in synchronism.
The invention is preferably embodied in a pre¬ payment system. If the system does not require the transmission of validation codes, the arrangement may be such that, at any given time, all the sub-systems used for receiving a particular broadcasting service generate the same security code.
The invention also extends to systems which use transmitted validation codes, e.g. subscription systems. Each sub-system may have a unique identity code, so that validation codes can be transmitted individually to the different sub-systems. In each sub-system, the validation code and the stored security code are used together to form an authorisation key to enable access (e.g. to enable de-scrambling of broadcast signals). Because the sub-system is only effective for a limited duration, it is no longer necessary for the system to transmit signals to the individual sub-systems in order to maintain them operational and, the end of the subscription, to disable them. Instead, the sub-system automatically remains operational throughout the subscription period, and is automatically disabled at the end of the subscription by virtue of the fact that it will no longer store a security code appropriate for the current date. This substantially reduces the number of validation signals which need to be transmitted, and thus the bandwidth requirements are relaxed.
A second aspect of the invention is concerned with a modification of this arrangement. According to this second aspect, an access system comprises a plurality of sub-systems, each storing a security code and each arranged to receive a validation code, each sub-system being operable to permit access on condition that an authorisation key derived from the validation code and the security code is deemed appropriate, wherein the sub¬ systems are divided into groups according to expiry date, and wherein sub-systems within a group having a common expiry date also have a common security code. In this case also, the number of signals needed to be transmitted can be greatly reduced as compared with the prior art. In the preferred embodiments, only a single validation code is transmitted for each user in order to render his sub¬ system operational. Further validation signals may be directed to the sub-system, e.g. to maintain it operational and/or to disable it at the expiry date, but the same signals would be used by other sub-systems in the same group, and therefore the total number of different signals needed to be transmitted is greatly reduced.
Of course in the above arrangements, as in the prior art, any signal which is transmitted is desirably repeated at intervals over a period to ensure that it has been received properly by all the sub-systems to which it is directed. However, unlike prior art systems, it is not necessary for this operation to be performed at regular intervals in order to maintain individual sub-systems operational throughout the subscription period and individually to disable the sub-systems at the end of the subscription period.
Arrangements embodying the invention will now be described with by way of example with reference to the accompanying drawing, in which:
Figure 1 is a schematic block diagram of an access system in accordance with the invention.
In the access system 2, which in this embodiment is a TV broadcasting system, picture signals delivered along a path 4 are scrambled by a picture signal scrambler 6 and then delivered to a transmitter 8. The transmitted signals are received by a receiver 10 which then delivers the scrambled picture signals to a descra bler 12. The descrambled picture signals are then presented to a display 14. The scrambler 6 scrambles the signals according to a code generated by a scrambling controller 16. The code is also delivered to an encrypter 18, which encrypts the codes in accordance with an authorisation key received from a control computer 20. The encrypted codes form control signals which are delivered to transmitter 8 and transmitted along with the transmitted picture signal.
A receiver 10 separates the encrypted control signals from the picture signals and delivers them to a key or sub-system 22. Within the sub-system the control signals are delivered to a decrypter 24, in which they are decrypted in accordance with an access signal in the form of an authorisation key received from a sub-system controller 26. Normally, the authorisation key generated by the sub-system controller 26 should correspond to that generated by the control computer 20, and hence the control signals can be decrypted by the decrypter 24, whereby they can be used by the descrambler 12 in order to descramble the picture signals. Obviously sound signals can be treated in the same way.
The control computer 20 receives a signal indicative of the current time and date from a clock 28. This signal is used to determine which address in a memory 30 is accessed in order to obtain the authorisation key sent to the encrypter 18. The memory 30 stores- substantial number of authorisation keys which are used in succession. By way of example, a new authorisation key may be used once a month.
In the sub-system 22, a signal indicative of the current time is delivered to the controller 26 on line 31. This signal may be generated by a clock in the receiving installation, or may be derived from signals transmitted by the transmitter 8. The controller 26 uses the time signal to determine which location in an author¬ isation key store 32 is read to derive the authorisation key sent to the decrypter 24.
The memory 32 stores a limited number of authorisation keys corresponding to those generated by the computer 20 over a limited period. Accordingly, once this period has expired, the sub-system 22 is no longer operable to enable correct descrambling of the picture signals.
In a simple embodiment, the period over which the sub-system 22 is useful is governed solely by what authorisation keys are stored in memory 32. Preferably, however, the sub-system 22 stores further information which places additional restrictions on the useful life of the sub-system 22. This further information may also be contained in the memory 32, and may include any or all of the following: (1) An expiry date. The controller 26 can compare this with the current date and not permit accessing of an author sa ion key if the current date is later than the expiry date.
(2) A start date. The controller 26 would compare this with the current time, and prevent the reading out of authorisation keys if the current time is prior to the start date. The start date could be programmed into the sub-system by the supplier.
(3) A lifespan. The controller would check whether the sub-system has been used for a period longer than the lifespan, and if so would prevent reading out of the authorisation keys- To achieve this, the sub¬ system would record the time at which it was first used. This could be accomplished by using the programmed start date referred to in paragraph (2). Alternatively, the sub-system could be arranged automatically to record the time at which it is first used.
The advantages of such an arrangement are that it allows essentially the same sub-system to be used in different circumstances, e.g. to cover different periods of use. For example, the sub-system could contain author¬ isation keys suitable for a period of 15 months, together with a lifespan of 12 months. This would allow the sub¬ system to have a shelf life of 3 months within which it could be purchased and still provide 12 months of use. If the lifespan, start date, and/or expiry date are programmable by the supplier he will be able to determine the periods for which the sub-system may be used. These parameters are preferably stored in the form of units corres ponding to the period between changes in authorisation key by the control computer 20. For example the start date could be recorded as the value "4" if the first authorisation key to be used by the sub-system is that corresponding to the fourth time period for which the authorisation keys stored in memory 32 are valid.
It will be understood that a system according to the present invention has the advantage over the prior art pre-payment system described above, in that there is a risk that the prior art system could be "fooled" into thinking that the expiry date has not yet been reached by interfering with the signals supplied to the sub-system which are intended to indicate the current time. In the present system, this would result in the sub-system producing the wrong security code, so that fraudulent reception of the service could not be achieved by this means.
In addition to or instead of the authorisation keys being selected according to the current date, means are preferably provided to determine whether an authorisation key is valid so that the controller 26 could perform a search operation in which authorisation keys are succesively selected until the correct one is chosen. To this end, an encrypted version of the correct authorisation key could be transmitted, and the sub¬ system could compare the decrypted version with its generated authorisation key to determine if the latter is valid.
Also or alternatively, a different authorisation key could be selected in response to a command broadcast by the transmitter 8. Accordingly, if it is found that the security system has been breached and that fraudulent access is being gained to the system, the security codes can be changed without requiring the users' sub-systems to be returned to a distributor and without requiring new sub-systems to be issued.
It is desirable that successive security codes produced by a key or sub-system have no readily descernible relationship between them. The key may be arranged to look up the security code (or a value which is used to calculate the security code) in a stored table, the look up location being determined at least in part by the current time. Alternatively, the key could be arranged to generate the security code using an algorithm dependent at least in part upon the current time. It is however preferred that the security codes be produced using a look-up table, because using an algorithm to generate the security codes results in a risk that the algorithm will be discovered to enable the fraudulent generation of security codes. In an alternative embodiment the authorisation key sent by the controller 26 to' the decrypter 24 is determined in dependence on both a security code accessed from the memory 32 and a validation code stored in a further memory 34. This validation code has been derived from the control signals transmitted by the transmitter 8. The validation codes are transmitted to. individual sub-systems. For this purpose they are transmitted along with addresses which correspond to unique identification numbers stored in the sub-systems. Accordingly, as is per se known in the art, the memory 3^ will receive only the validation code which is appropriate for the particular sub-system for which it is installed. The validation code is generated by the control computer 20 prior to transmission, and for this purpose a database 36 storing customer details and sub-system identification numbers is used.
In a further alternative, instead of each individual sub-system having a unique security code, the sub-systems can be arranged in groups sharing a common security code. Preferably, the sub-systems are divided into groups according to expiry date, and sub-systems within the same group use a common security code at any given time. The security code is combined with a validation code stored in the memory 3 to generate the authorisation key. An individual validation code is transmitted to a user when he first starts to use the sub-system to render his sub-system operational. Thereafter group messages are sent at regular intervals to all sub-systems having the same expiry date to maintain them operational, e.g. by transmitting the validation code appropriate for the next period. The messages are the same for all sub-systems within the group, and different from those sent to other groups. As the expiry date for a group approaches, no further enabling messages are sent to that group.
Similarily, the sub-systems could be divided or sub¬ divided geographically, such that sub-systems for use in the same geographical area have the same security code.
In a still further modi ication, instead of all sub¬ systems storing corresponding tables of security codes, each stores only a single security code which is common to the group.
The sub-systems described above could be easily modified to store a conventional security code in addition to the security codes referred to above so that the same sub-system can be used in a conventional manner for reception of one channel and in one of the ways described above for reception of another channel.
If validation codes are transmitted, they can contain information used to control the manner in which access is provided. For example, they could control which channels the sub-system is enabled for, and specific periods within which to enable them. Alternatively, they could contain keys used to decipher transmitted control signals determining the manner of access.
The decrypter 24 shown in Figure 1 could alternatively lie outside the sub-system 22.
In pre-payment conditional access systems, it has been proposed that the sub-system should provide a signal in dependence upon whether there is any remaining credit stored in the sub-system, and an enabling signal which is used only if the credit-indicating signal is present for enabling access, e.g. by descrambling broadcast tele¬ vision systems. According to another aspect of the present invention there is provided a conditional access system in which a key or sub-system is operable to generate enabling signals for enabling access only on condition that the sub-system stores a credit value. Thus, once the credit reaches zero, no enabling signals are generated and fraudulent access cannot be achieved by generating a false credit-indicating signal. For this purpose, the sub-system 22 of Figure 1 stores a credit value (e.g. in memory 32) which is automatically decremented as the sub-system is used, and the controller 26 accesses a security code only if the value is greater than zero. The sub-system 22 is shown in Figure 1 as having several functional blocks, including controller 26, decrypter 24, memory 32 and, optionally, memory 34. Although each of these blocks can be formed by respective circuits, it is preferred that the sub-system be formed by a microprocessor having a single memory and arranged to perform all the necessary functions. Thus, the access signal could be a multi-bit word transmitted to a decrypter, or could simply be a stored data value used by the microprocessor in performing a decryption function.
Although the present invention has been described primarily in connection with a sub-system which generates an authorisation key for decrypting control signals transmitted with a television signal, other techniques are possible. The control signals may be generated locally, rather than being broadcast by the television signal transmitter, or the signals frbm the sub-system could be used directly for descrambling television signals rather than decrypting control signals which are then used for descrambling. The authorisation keys produced by the sub-system may be used for other purposes than descrambling. In . addition to satellite broadcasting, the invention is useful also in terrestrial broadcasting and cable systems.
Of course the invention is also applicable to systems other than broadcasting systems. For example, the system could be used for controlling access to buildings, computers e.t.c. It is particularly useful where access is dependent upon the current time, e.g. for shift workers, because the security code produced by the key may be selected according to the current time.
It is preferred that the key or sub-system described above be detachable, and preferably portable. Devices which are particularly suitable for use as the key are the tokens described in published patent applications.GB- A-2153128 and GB-A-2196450 and GB patent application 8626233- However, some aspects of the invention are useful also with non-detachable sub-systems.

Claims

CLAIMS :
1. A key for a controlled access system, the key being operable to produce a security code to be used in determining whether access is provided to the system, wherein the key is operable to produce a different security code after a selected time.
2. A key as claimed in claim 1, including means responsive to a signal indicative of the current time for determining the security code to be generated.
3- A key as claimed in claim 1 or claim 2, including a memory storing a plurality of selectable security codes-
4. A key as claimed in any preceding claim, the key being operable to determine whether the produced security code is valid, and if not to produce said different security code.
5- A key as claimed in any preceding claim, the key- storing data determining a duration within which it is operable to produce a security code of a type which permits access.
6. A key as claimed in any preceding claim, the key being automatically operable to store an indication of the time at which it first generated a security code permitting access.
7. An access system having a key as claimed in any preceding claim.
8. An access system as claimed in claim 7, comprising a distribution station and a plurality of receiving stations, each having a respective key as claimed in any one of claims 1 to 6.
9. An access system as claimed in claim 8, wherein each key is operable to generate an authorisation key signal determining whether access is provided and dependent on both a security code and a validation code received from the distribution station.
10. An access system as claimed in claim 9 , wherein the keys are divided into groups within each of which the keys have a respective common expiry date and a respective common security code.
11. An access system comprising a distribution station and a plurality of receiving stations each having a respective key for selectively permitting access to the system in dependence on -whether or not an authorisation key signal generated by the key is appropriate, wherein the authorisation key signal is determined in dependence on both a validation code received from the distribution station and a security code, a"nd wherein the keys are divided into groups within each of which the keys have a respective common expiry date and a respective common security code.
12. An access system as claimed in any one of claims 8 to 11, wherein the distribution station is a TV broadcasting station, and wherein each receiving station is operable to unscramble picture signals on condition that the respective key generates an access signal permitting access to the system.
13. An access system substantially as herein described with reference to the accompanying drawing.
SUBSTITUTESHEET
PCT/GB1988/000151 1987-03-02 1988-03-02 Access systems WO1988006826A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB8704850 1987-03-02
GB878704850A GB8704850D0 (en) 1987-03-02 1987-03-02 Access systems

Publications (1)

Publication Number Publication Date
WO1988006826A1 true WO1988006826A1 (en) 1988-09-07

Family

ID=10613187

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1988/000151 WO1988006826A1 (en) 1987-03-02 1988-03-02 Access systems

Country Status (4)

Country Link
EP (1) EP0304458A1 (en)
JP (1) JPH02500316A (en)
GB (1) GB8704850D0 (en)
WO (1) WO1988006826A1 (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0271748A2 (en) * 1986-12-13 1988-06-22 GRUNDIG E.M.V. Elektro-Mechanische Versuchsanstalt Max Grundig holländ. Stiftung & Co. KG. System for processing scrambled transmission information
EP0371451A2 (en) * 1988-11-28 1990-06-06 Secure-Time, Inc. Electronic controller switch
WO1991006926A1 (en) * 1989-10-31 1991-05-16 Security Dynamics Technologies, Inc. Method and apparatus for secure identification and verification
EP0438154A2 (en) * 1990-01-19 1991-07-24 Canon Kabushiki Kaisha Multimedia network system
EP0485887A2 (en) * 1990-11-16 1992-05-20 General Instrument Corporation Of Delaware Apparatus and method for upgrading terminals to maintain a secure communication network
EP0618736A1 (en) * 1993-03-31 1994-10-05 Philips Electronique Grand Public Method and device for scrambling and descrambling of a television transmission
EP0618550A1 (en) * 1993-03-31 1994-10-05 N.V. Nederlandsche Apparatenfabriek NEDAP Access-permitting system having decentral authorizations
EP0776131A3 (en) * 1995-11-24 1998-02-11 Matsushita Electric Industrial Co., Ltd. Two-way data communication method and two-way data communication apparatus using the same
FR2757300A1 (en) * 1996-12-16 1998-06-19 Ricard Claude Rented taximeter with automatic disabling if rental payment is not made
WO2002102075A1 (en) * 2001-06-08 2002-12-19 Koninklijke Philips Electronics N.V. Device and method for selectively supplying access to a service encrypted using a control word, and smart card
US6985583B1 (en) 1999-05-04 2006-01-10 Rsa Security Inc. System and method for authentication seed distribution
EP1863206A1 (en) * 2006-05-30 2007-12-05 Huawei Technologies Co., Ltd. A method of switching a decryption key, a decryption device and a terminal
US7363494B2 (en) 2001-12-04 2008-04-22 Rsa Security Inc. Method and apparatus for performing enhanced time-based authentication
CN100455010C (en) * 2004-12-27 2009-01-21 国家广播电影电视总局广播科学研究院 Implement method for controlling generation of granting command from digital TV user management system
CN1647497B (en) * 2002-04-05 2010-12-01 Abb研究有限公司 Method for remotely controlling and/or regulating a system
EP2334070A1 (en) * 2009-12-11 2011-06-15 Irdeto Access B.V. Generating a scrambled data stream
EP2334069A1 (en) * 2009-12-11 2011-06-15 Irdeto Access B.V. Providing control words to a receiver
US8370638B2 (en) 2005-02-18 2013-02-05 Emc Corporation Derivative seeds

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0021938A1 (en) * 1979-06-15 1981-01-07 Etablissement Public de Diffusion dit "Télédiffusion de France" Television system with access control using a variable electronic key
EP0127381A1 (en) * 1983-05-27 1984-12-05 M/A-Com Government Systems, Inc. Key signal encryption and distribution system for controlling scrambling and selective, remote descrambling of television signals
EP0137960A1 (en) * 1983-08-19 1985-04-24 Nec Corporation Device for calculating a charge for a charged information signal with errors avoided in a report of the charge
WO1985003785A1 (en) * 1984-02-22 1985-08-29 Gordian Systems, Inc. Solid state key for controlling access to computer software
EP0153837A2 (en) * 1984-02-15 1985-09-04 Matsushita Electric Industrial Co., Ltd. Pay television system
EP0178809A1 (en) * 1984-10-12 1986-04-23 John David Wiedemer High security pay television system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0021938A1 (en) * 1979-06-15 1981-01-07 Etablissement Public de Diffusion dit "Télédiffusion de France" Television system with access control using a variable electronic key
EP0127381A1 (en) * 1983-05-27 1984-12-05 M/A-Com Government Systems, Inc. Key signal encryption and distribution system for controlling scrambling and selective, remote descrambling of television signals
EP0137960A1 (en) * 1983-08-19 1985-04-24 Nec Corporation Device for calculating a charge for a charged information signal with errors avoided in a report of the charge
EP0153837A2 (en) * 1984-02-15 1985-09-04 Matsushita Electric Industrial Co., Ltd. Pay television system
WO1985003785A1 (en) * 1984-02-22 1985-08-29 Gordian Systems, Inc. Solid state key for controlling access to computer software
EP0178809A1 (en) * 1984-10-12 1986-04-23 John David Wiedemer High security pay television system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Journal of the Institution of Electronics and Radio Engineers, vol. 55, no. 11/12, November/December 1985, S.M. Edwardson: "A conditional access system for direct broadcasting by satellite" *

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0271748A3 (en) * 1986-12-13 1990-03-14 Grundig E.M.V. Elektro-Mechanische Versuchsanstalt Max Grundig Holland. Stiftung & Co. Kg. System for processing scrambled transmission information
EP0271748A2 (en) * 1986-12-13 1988-06-22 GRUNDIG E.M.V. Elektro-Mechanische Versuchsanstalt Max Grundig holländ. Stiftung & Co. KG. System for processing scrambled transmission information
EP0371451A2 (en) * 1988-11-28 1990-06-06 Secure-Time, Inc. Electronic controller switch
EP0371451A3 (en) * 1988-11-28 1991-04-03 Secure-Time, Inc. Electronic controller switch
WO1991006926A1 (en) * 1989-10-31 1991-05-16 Security Dynamics Technologies, Inc. Method and apparatus for secure identification and verification
US5159633A (en) * 1990-01-19 1992-10-27 Canon Kabushiki Kaisha Multimedia network system
EP0438154A2 (en) * 1990-01-19 1991-07-24 Canon Kabushiki Kaisha Multimedia network system
EP0438154A3 (en) * 1990-01-19 1992-07-22 Canon Kabushiki Kaisha Multimedia network system
EP0485887A2 (en) * 1990-11-16 1992-05-20 General Instrument Corporation Of Delaware Apparatus and method for upgrading terminals to maintain a secure communication network
EP0485887A3 (en) * 1990-11-16 1992-12-09 General Instrument Corporation Apparatus and method for upgrading terminals to maintain a secure communication network
EP0618736A1 (en) * 1993-03-31 1994-10-05 Philips Electronique Grand Public Method and device for scrambling and descrambling of a television transmission
EP0618550A1 (en) * 1993-03-31 1994-10-05 N.V. Nederlandsche Apparatenfabriek NEDAP Access-permitting system having decentral authorizations
FR2703552A1 (en) * 1993-03-31 1994-10-07 Philips Electronics Nv Method and apparatus for scrambling and descrambling a specific television program
NL9300566A (en) * 1993-03-31 1994-10-17 Nedap Nv Access granting system with decentralized authorizations.
US5887062A (en) * 1995-11-24 1999-03-23 Matsushita Electric Industrial Co., Ltd. Two-way data communication method and two-way data communication apparatus using the same
EP0776131A3 (en) * 1995-11-24 1998-02-11 Matsushita Electric Industrial Co., Ltd. Two-way data communication method and two-way data communication apparatus using the same
FR2757300A1 (en) * 1996-12-16 1998-06-19 Ricard Claude Rented taximeter with automatic disabling if rental payment is not made
US7502467B2 (en) 1999-05-04 2009-03-10 Rsa Security Inc. System and method for authentication seed distribution
US6985583B1 (en) 1999-05-04 2006-01-10 Rsa Security Inc. System and method for authentication seed distribution
WO2002102075A1 (en) * 2001-06-08 2002-12-19 Koninklijke Philips Electronics N.V. Device and method for selectively supplying access to a service encrypted using a control word, and smart card
CN1305310C (en) * 2001-06-08 2007-03-14 皇家菲利浦电子有限公司 Device and method for selectively supplying access to a service encrypted using a control word and smart card
US7477744B2 (en) 2001-06-08 2009-01-13 Irdeto Eindhoven B.V. Device and method for selectively supplying access to a service encrypted using a control word, and smart card
US7363494B2 (en) 2001-12-04 2008-04-22 Rsa Security Inc. Method and apparatus for performing enhanced time-based authentication
US8032749B2 (en) 2002-04-05 2011-10-04 Abb Research Ltd Method for remotely controlling and/or regulating a system
CN1647497B (en) * 2002-04-05 2010-12-01 Abb研究有限公司 Method for remotely controlling and/or regulating a system
CN100455010C (en) * 2004-12-27 2009-01-21 国家广播电影电视总局广播科学研究院 Implement method for controlling generation of granting command from digital TV user management system
US8370638B2 (en) 2005-02-18 2013-02-05 Emc Corporation Derivative seeds
EP1863206A1 (en) * 2006-05-30 2007-12-05 Huawei Technologies Co., Ltd. A method of switching a decryption key, a decryption device and a terminal
EP2334070A1 (en) * 2009-12-11 2011-06-15 Irdeto Access B.V. Generating a scrambled data stream
CN102098543A (en) * 2009-12-11 2011-06-15 耶德托公司 Generating a scrambled data stream
EP2334069A1 (en) * 2009-12-11 2011-06-15 Irdeto Access B.V. Providing control words to a receiver
CN102149006A (en) * 2009-12-11 2011-08-10 耶德托公司 Providing control words to a receiver
EP2334071A3 (en) * 2009-12-11 2013-05-15 Irdeto B.V. Providing control words to a receiver
EP2334072A3 (en) * 2009-12-11 2013-05-22 Irdeto B.V. Generating a scrambled data stream
CN102149006B (en) * 2009-12-11 2016-01-20 爱迪德技术有限公司 Control word is provided to receiver

Also Published As

Publication number Publication date
JPH02500316A (en) 1990-02-01
GB8704850D0 (en) 1987-04-08
EP0304458A1 (en) 1989-03-01

Similar Documents

Publication Publication Date Title
EP0151147B1 (en) Security system for television signal encryption
WO1988006826A1 (en) Access systems
CN100499799C (en) Transmission system of supplying conditional access for transmitted data
US4736422A (en) Encrypted broadcast television system
EP0195523B1 (en) Program blocking method for use in direct broadcast satellite system
EP0817485B1 (en) Conditional access system and smartcard allowing such access
US6005938A (en) Preventing replay attacks on digital information distributed by network service providers
EP0717566B1 (en) Method and apparatus for incremental delivery of access rights
CA1277764C (en) System for enabling descrambling on a selective- subscription basis in a subscriber communication network
EP0984629B1 (en) System for broadcasting data signals in a secure manner
US7881478B2 (en) Method for controlling access to an encrypted programme
KR20010030925A (en) Method and apparatus for encrypted data stream transmission
MXPA01008522A (en) Method for operating a conditional access system for broadcast applications.
US8401190B2 (en) Portable security module pairing
US7454618B2 (en) System and methods for transmitting encrypted data with encryption key
CN101247508B (en) Method for terminal implementing service authorization in conditioned receiving system
JPH09139930A (en) Ic card for pay broadcast and pay broadcast system
EP0910216A1 (en) Process for transferring a scrambling key
JPH0521397B2 (en)

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE FR GB IT LU NL SE

WWE Wipo information: entry into national phase

Ref document number: 1988902158

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1988902158

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1988902158

Country of ref document: EP