WO2008096066A2 - Procede de gestion du nombre de visualisations, processeur de securite et terminal pour ce procede - Google Patents
Procede de gestion du nombre de visualisations, processeur de securite et terminal pour ce procede Download PDFInfo
- Publication number
- WO2008096066A2 WO2008096066A2 PCT/FR2007/002137 FR2007002137W WO2008096066A2 WO 2008096066 A2 WO2008096066 A2 WO 2008096066A2 FR 2007002137 W FR2007002137 W FR 2007002137W WO 2008096066 A2 WO2008096066 A2 WO 2008096066A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- audiovisual content
- visualizations
- segment
- content
- license
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00166—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
- G11B20/00181—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software using a content identifier, e.g. an international standard recording code [ISRC] or a digital object identifier [DOI]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00797—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of times a content can be reproduced, e.g. using playback counters
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00847—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction is defined by a licence file
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2389—Multiplex stream processing, e.g. multiplex stream encrypting
- H04N21/23895—Multiplex stream processing, e.g. multiplex stream encrypting involving multiplex stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26606—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/414—Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
- H04N21/4147—PVR [Personal Video Recorder]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/438—Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving encoded video stream packets from an IP network
- H04N21/4385—Multiplex stream processing, e.g. multiplex stream decrypting
- H04N21/43853—Multiplex stream processing, e.g. multiplex stream decrypting involving multiplex stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management e.g. creating a master electronic programme guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management e.g. creating a master electronic programme guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8355—Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/845—Structuring of content, e.g. decomposing content into time segments
- H04N21/8456—Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
Definitions
- the present invention relates to a method for managing the number of visualizations, a security processor and a terminal for this method.
- the electronic reader notably allowing jumps backwards to read a previous segment before the end of the audiovisual content is reached,
- the digital audiovisual contents are, for example, videograms such as films or a television program.
- a segment is an ordered and consecutive sequence of images and / or sounds. This segment is recorded in a format adapted to be read by the electronic reader and then viewed on a screen. When viewed on a screen, the images and sounds of a segment are sequenced one after the other at a frequency greater than or equal to 50 Hz so as to create an impression of visual and auditory continuity between the different images and sounds. of the same segment. Two segments are said to be consecutive, if during the reading of these segments in the prescribed order, the time interval between the moment when the preceding segment ceases to be played from the instant when the next segment begins to to be played is less than 1/50 second. Thus, when two segments are consecutive, a visual and auditory continuity is ensured between these two segments for the user.
- the audiovisual content has been viewed once when each of its segments has been viewed at least once.
- This strategy is very permissive because it also allows a user to view as many times as he wants a given segment back systematically after viewing this segment.
- a somewhat less permissive strategy is to increment a counter each time a segment of the audiovisual content is viewed. This counter is then compared to a predetermined threshold. If the threshold is exceeded, the number of visualizations already performed is incremented by one. With this strategy, the user can no longer view as many times as he wants the same segment without the number of visualizations already made being incremented. On the other hand, conversely, the number of visualisations already carried out can be incremented even if certain segments have never been visualized.
- the invention aims to satisfy this wish. It therefore relates to a method of managing the number of visualizations of an audiovisual content comprising:
- each cell being associated in a one-to-one manner with a respective segment of the audiovisual content, each cell being able to contain a number
- the table allows to memorize a representation of the number of times that each segment of the audiovisual content has been viewed.
- the contents of this table also makes it possible to detect the use of jumps backwards.
- the granulometry of the information contained in this table is therefore sufficient to be able to implement a large number of different strategies for calculating the number of visualizations already performed.
- the method is therefore sufficiently flexible so that each operator or audiovisual content provider can define his own strategy for calculating the number of visualizations already made.
- this license comprising at least:
- a cryptographic redundancy such as a signature made using a cryptographic key, of at least a part of each of the preceding information
- the license includes a T_Anti_Reuse identifier of its previous use, - a security processor equipped with information storage means containing:
- the T_Anti_Reuse and C_Anti_Reuse identifiers are modified so that their new respective values correspond, and - before each new use of the reader to view the audiovisual content, the visualization of the audiovisual content is authorized only if the value of the identifier T_Anti_Reuse corresponds to the value of the identifier C_Anti_Reuse; the selection of an algorithm for calculating the number of visualizations to be performed when calculating the number of visualizations, according to the content of the license, among a set of several different calculation algorithms that can be executed, two algorithms of calculation being considered different if there is the same content of the cells of the table from which the two algorithms give different results;
- each ECM message containing:
- the predetermined step used to increment or decrement the number contained in the cell associated with a segment decreases or increases as a function of the number of times this segment has already been viewed.
- the transmission of the license in the form of an EMM message limits the adaptations to be made to the security processor so that it can receive and process the license
- the subject of the invention is also a security processor containing instructions for the execution of the above management method when these instructions are executed by an electronic computer.
- the subject of the invention is also a terminal for reading an audiovisual content, this terminal comprising: an information recording medium containing the recorded digital audio-visual content, this content being divided into a plurality of consecutive time segments and intended to to be read automatically in a prescribed order,
- the terminal being able to: calculate the number of visualizations of this audiovisual content already made
- the terminal comprises an array containing as many cells as time segments, each cell being associated one-to-one with a respective segment of the audiovisual content, each cell being able to contain a number, and
- the terminal is able to:
- FIG. 1 is a schematic illustration of a terminal for reading recorded digital audio-visual contents
- FIG. 2 is a schematic illustration of audiovisual content that can be viewed using the terminal of FIG. 1,
- FIG. 3 is a schematic illustration of an ECM (Entitlement Control Message) recorded with the audiovisual content of FIG. 2,
- FIG. 4 is a schematic illustration of a license used in the terminal of FIG. 1;
- FIG. 5 is an illustration of the structure of a table contained in the license of FIG. 4;
- FIG. 6 is an illustration of an anti-replay list contained in a security processor of the terminal of FIG.
- FIGS. 7A and 7B are flow charts of a method for managing the number of visualizations of the audiovisual content implemented in the terminal of FIG. 1,
- FIG. 8 is a schematic illustration of the structure of an EMM-U (Entitlement Management Message with Unique Address) generated during the execution of the method of FIG. 7, and FIGS. 9 to 11 are flowcharts, respectively , of three algorithms for calculating the number of visualizations already carried out.
- EMM-U Entitlement Management Message with Unique Address
- FIG. 1 represents a terminal 2 for reading digital audiovisual content.
- This terminal 2 is able to control the display on a screen 4 audiovisual content read so that they can be viewed by a user.
- user here is meant a human being.
- the screen 4 is, for example, typically a television screen.
- the terminal 2 comprises a decoder 6 connected to an information recording medium 8.
- the audio-visual contents are recorded on this medium 8.
- the contents CANi and CAN 2 are, for example, audiovisual content scrambled with CW control words.
- Audiovisual content is divided into a multitude of time segments CAN_1 to CAN_N. These segments CAN_i follow each other in a prescribed order.
- the CAN_1 segment corresponds to the first segment to be read and the CAN_N segment corresponds to the last segment to be read.
- each CAN j segment is scrambled using a single control word CW different from that used to scramble the preceding segments and subsequent segments.
- each segment corresponds to a cryptoperiod.
- the duration of a cryptoperiod is generally 10 seconds.
- Each segment or cryptoperiod CANJ is associated with a message
- ECM Entitlement Control Message
- ECM_i contains a cryptogram CW * of the control word CW used to scramble the segment CAN_i.
- the ECM_i messages are recorded on the support 8 at the same time as the CANj segments.
- ECM_i is for example compliant with the UTE C90-007 standard "Conditional access system for digital broadcasting systems" used in the field of signal transmission Multimedia scrambled through long-distance information transmission networks such as, for example, networks involving satellites.
- the message ECM_i comprises an SOID field containing both an identifier of the operator having broadcast this audiovisual content and an identifier of the cryptographic context to be applied.
- the identifier of the cryptographic context to be applied notably allows a security processor to identify which is the cryptographic key (s) to be used to process this ECM message.
- the message ECM_i also includes:
- ECM_R field containing a cryptographic redundancy such as a MAC (Message Authentication Code) or a cryptographic signature of the ECMJ relating to a part of the information contained in each of the preceding fields of this ECMJ message.
- a cryptographic redundancy such as a MAC (Message Authentication Code) or a cryptographic signature of the ECMJ relating to a part of the information contained in each of the preceding fields of this ECMJ message.
- the identifier CJd establishes a one-to-one relationship between this message ECMJ and a cell of the table of FIG.
- each license includes the following fields:
- NVA field containing a positive integer number NVA corresponding to the number of visualizations authorized for the audiovisual content identified by the identifier Contentjd
- a T_Anti_Reuse field containing a T_Anti_Reuse identifier of the previous use of the license, used to avoid that the same license can be reused several times; typically this identifier is a number whose value strictly increases with each new use of the license,
- an L_R field containing a cryptographic redundancy L_R such as a MAC or a cryptographic signature relating to at least part of the information contained in each of the preceding fields.
- L_R a cryptographic redundancy
- the Params field contains values for the following parameters:
- Cryptographic redundancy LR is constructed by implementing a cryptographic algorithm and a cryptographic key.
- Figure 5 shows schematically an example of a possible structure for the Tab table.
- this table is formed of N successive cells classified in the order from 1 to N.
- N is an integer equal to the number of segments contained in the audiovisual content with which the license is associated.
- Each cell is intended to contain a number coded on a number of bits that can be parameterized using the parameter C_Size contained in the Params field of the license.
- each of these cells represent the value of the identifier C Id making it possible to identify the cell situated just in -Dessous.
- the decoder 6 comprises:
- an electronic reader 10 able to read and write information on the support 8
- a filter 12 able to direct the scrambled audiovisual content to a descrambler and a decoder 14 and to send the messages ECM_i associated with this scrambled audiovisual content to a decoder / card interface 16
- the descrambler and decoder 14 includes, for illustration only, a receiver 18 adapted to receive via a wireless network 20 for transmitting information scrambled audiovisual content and ECM messages associated with this audiovisual content.
- the scrambled audiovisual contents as well as the ECM messages are broadcast by a remote transmitter 24 to a multitude of remote terminals, such as the terminal 2.
- the terminal 2 also comprises a security processor 30 connected to the decoder 6.
- This security processor 30 is designed to process ECM and EMM (Entitlement Management Message) and perform the encryption and decryption operations necessary for the operation of the terminal 2.
- the processor 30 comprises:
- an interface 32 capable of cooperating with the interface 16 of the decoder in order to receive from the latter ECM and EMM messages
- a computer 34 able to process the EMM and ECM messages received via the interface 32
- a non-volatile memory 36 in which the various information necessary for the encryption / decryption operations is stored
- the processor 30 is a removable security processor such as a smart card.
- the memory 36 contains:
- the memory 36 also contains the following information:
- TdA access titles intended to be compared with the CdA access conditions contained in an ECM message in order to determine whether this ECM message may or may not be processed by the processor 30,
- Figure 6 shows an example of a possible structure for the list
- This list includes, for example, a first column containing the identifiers Contentjd and a second column comprising the identifier
- the CAR list contains as many lines as licenses already read by the reader 10.
- the memory 36 also includes an ArrayCcrement array for use in conjunction with the Algo3 algorithm.
- the table Tablncrcons is, for example, the following:
- the first line X of this table contains integers each corresponding to a number of times a segment has been viewed.
- the second line Y associates with each of these integers a step of incrementation. It should be noted that this incrementation step is here a monotonically decreasing function of the number of times a segment has already been read.
- the line Z gives the number actually taken into account by the algorithm for each display number of a segment.
- the terminal 2 comprises a remote control 40 for controlling via a wireless link 42 the decoder 6.
- a remote control 40 for controlling via a wireless link 42 the decoder 6.
- a key 44 making it possible to trigger the reading of a selected audio-visual content among the various audio-visual contents recorded on the medium 8
- a key 45 making it possible to stop the reading of an audiovisual content in order, for example, to switch to reading other audiovisual content or simply stop reading
- a key 46 making it possible to jump backwards, that is to say to go directly from the segment currently read to a preceding segment without it being necessary for it to read the intermediate segments between the currently read segment and the previous segment, and
- a key 47 making it possible to jump forward, that is to say making it possible to go from the currently read segment directly to a next segment without having to read the intermediate segments situated between the segment currently read and the following segment.
- the transmitter 24 sends the terminal 2 scrambled audiovisual content and the corresponding ECM messages via the network. 20.
- the terminal 2 records this scrambled audiovisual content and the corresponding ECM messages on the medium 8 so as to obtain, for example, the recorded audiovisual content CAN-i.
- the transmitter 24 transmits via the network 20 or by another communication mode, the license Li to the terminal 2.
- This is the initial version of the license L- ), containing in particular the initial value of the NVA number of authorized views of this content.
- this initial value allows at least two complete visualizations of the content.
- this license is transmitted in an EMM-U message whose structure is shown in FIG. 8. More precisely, the structure of this EMM-U message complies with the UTE C90-007 standard. (already mentioned) in the field of the transmission of scrambled multimedia signals. In Figure 8, only the elements necessary for understanding the remainder of the description are shown.
- the message EMMJJ comprises the same fields as those already described with reference to FIG. 4, so that their description will not be repeated here in detail.
- a step 76 only the terminal 2 whose security processor corresponds to the identifier UA contained in the EMM-U message records the license received on the support 8.
- the license may be sent before or at the same time as the content, as well as for its recording on the medium 8. Steps 70 and 74 may thus be simultaneous or swapped, as well as steps 72 and 72.
- steps 72 and 76 remain subsequent to steps 70 and 74, respectively.
- the user of the terminal 2 triggers the playback of one of the audiovisual contents recorded on the support 8 using the remote control 40, for example. It is assumed here that the reading of the CANi content is triggered. A phase 80, called logon, then begins.
- a step 82 if several licenses exist for the same audiovisual content, the user selects the license to use to view this content.
- the license Li is automatically selected since only this license is associated with the content CAN 1 .
- the terminal sends the selected license to the processor 30 via the interfaces 16 and 32.
- the decoder transmits the EMM-U message representing the license l_i, this EMM-U message being identical to that of FIG. 8.
- a step 86 the processor 30 verifies that the identifier UA contained in the received EMM-U message corresponds to the identifier UA stored in the memory 36. For example, in step 86, the processor 30 checks if these identifiers UA are identical.
- step 88 the processor 30 verifies the authenticity of the received license using cryptographic redundancy L_R. More specifically, in step 88, the processor 30 proceeds from the contents of the license fields received to operations similar to those previously performed to obtain the redundancy L_R. In particular, during step 88, at least one of the operations involves encryption or decryption with a cryptographic key. For example, the cryptographic key used in the cryptographic redundancy is identified by virtue of the context identifier contained in the SOID field of the EMM-U message.
- the processing of the cryptographic redundancy by the processor leads to a positive result, for example if the redundancy built by the processor 30 is identical to the redundancy contained in the L_R field, then the license is considered authentic and integrity and the processor proceeds to a step 90.
- step 90 the processor 30 searches for the identifier C_Anti_Reuse associated with the identifier Contentjd contained in the received license. If no identifier of the list CAR corresponds to the identifier Contentjd received, then the processor 30 adds, during a step 92, the identifier Contentjd received to the list CAR and associates this identifier with a value identifier C_Anti_Reuse initialized to zero .
- the processor 30 compares the value of the identifier T_Anti_Reuse of the license received to the value of the identifier C_Anti_Reuse associated with the identifier Contentjd in the list CAR. If the identifiers correspond, for example if the values are identical, then the processor 30, during a step 96, checks that the number NVA contained in the license received is strictly greater than zero. If so, during a step 98, the processor 30 stores in its memory 38 the parameters contained in the Params field, the numbers NVA, NCV and the table Tab contained in the license received.
- step 86 If one of the checks performed in steps 86, 88, 94 or 96 fails, the processor 30 proceeds to a step 100 of stopping the processing of the received license and stopping the decryption of the scrambled audiovisual content.
- step 98 the phase 80 is completed and a phase 104 for reading the audiovisual content begins automatically.
- the first CAN_1 segment CANi audiovisual content is read and transmitted to the descrambler 14.
- the associated ECIVM message is transmitted to the processor 30.
- the CdA access conditions contained in the ECM_1 message are compared with the TdA access titles contained in the memory 36. In the case where the access conditions correspond to the TdA access titles. , then the method continues with a step 112 of extracting the identifier C_ld contained in the ECIVM message received.
- the processor 30 increments by a specified step the cell of the received Tab table corresponding to the extracted identifier CJd.
- Step 114 is executed only if the maximum size of the cell specified by the identifier CJd has not already been reached.
- the processor 30 also increments the number NCV by a specified step.
- the processor determines whether a new visualization of the audiovisual content has been performed. This determination is made by executing the algorithm corresponding to the identifier Algojd. Algorithms corresponding respectively to the identifiers Algol, Algo2 and
- step 122 in which the number NVA is incremented and, if necessary, the table Tab and the number NVC are updated.
- the processor 30 verifies that the number NVA is strictly greater than zero. If the number NVA is always strictly greater than zero, then in a step 126, the processor extracts the cryptogram CW * contained in the received ECIVM message and then decrypts the cryptogram with a decryption key recorded in the context associated with the content of the SOID field. Then, during a step 128, the decrypted CW control word is transmitted to the descrambler 14.
- step 1 10 If during step 1 10, the access conditions received do not correspond to the registered access titles, or if in step 124, the number NVA is less than or equal to zero, then the processor 30 proceeds immediately in a step 130 for stopping the processing of received ECMj messages. Consequently, no new control word CW is supplied to the descrambler which prevents the correct descrambling of the audiovisual content recorded on the medium 8.
- step 120 If in step 120 it has been determined that no further visualization has been performed, then the process proceeds from step 120 directly to step 126.
- step 128 the descrambler 14 descrambles the segment CAN_1 using the control word CW received from the processor 30. Then, during a step 134, the descramble segment is displayed in clear on the screen 4. At the end of step 134, the method automatically returns to steps 106 and 108 to read the next segment of audiovisual content CAN-i.
- the steps 106 to 134 are repeated for each of CANj CANi content segments in the order of these segments.
- the user can also use the keys 46 and
- the processor 30 After viewing the audiovisual content, the user can decide to end this display, for example, by pressing the key 45. At this time, the processor 30 proceeds to a phase 140 of closing the session. Classes. At the beginning of the phase 140, during a step 142, the processor 30 increments the number constituting the identifier C_Anti_Reuse associated with the identifier Contentjd in the list CAR. Then, in a step 144, the processor generates an updated license, that is to say that the updated license contains the new values of the numbers NVA, NCV, T_Anti_Reuse, and Tab, and a value L__R restored.
- the value of the identifier T__Anti_Reuse of the updated license is identical to that of the identifier C_Anti_Reuse associated with the identifier Contentjd in the list CAR.
- the redundancy L_R is built from the new values of the license and using the appropriate cryptographic key recorded in the context associated with the identifier SOID.
- the processor 30 transmits the updated Li license to the decoder 6 which saves it instead of the Li license previously recorded on the support 8.
- the Algol algorithm uses two parameters contained in the license, namely the Si threshold and the C_Size parameter.
- the parameter C_Size is set to one bit.
- the processor 30 detects a discontinuity in the playback of the audiovisual content. For example, this discontinuity can be detected in response to the depression of one of the keys 46 or 47. The discontinuity can also be detected by observing a discontinuity in the values of the identifiers CJd contained in the ECMJs received. Then, when this discontinuity has been detected, during a step 152, the processor 30 considers that a new visualization of the audiovisual content has been performed if the number of cells of the table Tab containing a "1" is greater than or equal to the threshold S 1 . If yes, at step 122, the number NVA is decremented by one and all cells in the Tab array are reset to zero.
- Step 152 is also executed automatically when the end of the last segment of the audiovisual content is reached.
- the Algol algorithm allows the repeated display of a restricted portion by the threshold S1 of the content but limits the number of visualizations as soon as the part of the content displayed is larger.
- FIG. 10 illustrates the Algo2 algorithm for calculating the number of visualizations already carried out.
- This algorithm Algo2 uses the parameters C_Size, Si and S 2 contained in the license.
- the parameter C_Size is equal to one bit.
- a discontinuity in the playback of the audiovisual content is detected.
- the number NVA is decremented by one and all the cells of the table Tab as well as the value of the NCV number are reset to zero.
- the algorithm Algo2 differs from Algol in that it limits the visualization of a restricted part of the content, by action of the threshold S 2 .
- Figure 11 illustrates the algorithm Algo3.
- the algorithm Algo3 uses the parameters C_Size and S 2 of the received license.
- the identifier of the Algo3 algorithm indicates to the processor 30 that the increment step used in step 116 is determined from the Tablncrement table.
- a step 170 the processor 30 detects a discontinuity in the playback of the audiovisual content.
- the processor 30 detects a discontinuity in the playback of the audiovisual content.
- a step 172 it is determined that a new visualization has been performed if the number NCV is greater than the threshold S 2 . If so, in step 122, the number NVA is decremented by one and the number NCV and all the cells of the table Tab are reset to zero. Note that in this last embodiment, the number NCV is incremented by one when a segment is viewed for the first time. On the other hand, when this same segment is visualized a second time, the number NCV is only incremented by 0.5. Then, if this segment is still viewed other times, the increment used in step 116 is even smaller. Thus, in this way, we assign a smaller importance to subsequent visualizations of the same segment as the first visualization.
- the license may be transmitted from the transmitter to the decoder and then from the decoder to the security processor using a message other than an EMM-U message.
- a message other than an EMM-U message For example, any signed data structure can be used.
- the security processor 30 has been described here as being a removable processor. Alternatively, the processor 30 is integrated in the decoder 6 and permanently attached thereto.
- the license does not contain an L_R field and is therefore not protected by a signature.
- the LJd field may be omitted.
- the selection of the license to be used may be automatic. For example, the oldest license can be used first.
- each segment corresponds to a cryptoperiod.
- a segment corresponds to several successive cryptoperiods.
- several ECMj messages will have the same identifier CJd.
- the cells of the Tab array can be decremented instead of incremented.
- the NCV field may be omitted.
- the license can also be common to several audiovisual contents recorded on the support 8.
- the identifier Contentjd identifies not only a single audiovisual content, but a group of audiovisual contents that can be viewed using the terminal 2 .
- step 110 may be performed after step 124.
- control of the number of visualizations already carried out is carried out after the reading of each segment.
- this control can be performed only at the end of the reading session.
- the number of sessions will be limited.
- the incrementation step used by the algorithm may be provided by a parameter of the ECM message to take account of the variable interest of one part or the other of the content.
- the support 8 may be a removable medium such as, for example, a
- DVD-RW Digital Video Disc-Rewritable
- CD-RW Compact Disc-Rewritable
- It can be a non-rewritable removable media (DVD-R, CD-R), in which case the license is stored in a non-volatile memory of the electronic reader. What has been described here in the case of audiovisual content can also be applied to audio content without video.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Description
Claims
Priority Applications (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2007800469116A CN101563920B (zh) | 2006-12-21 | 2007-12-20 | 用于管理显示的次数的方法、用于所述方法的安全处理器和终端 |
| PL07872422T PL2098073T3 (pl) | 2006-12-21 | 2007-12-20 | Sposób zarządzania liczbą wyświetleń, procesor bezpieczeństwa i terminal dla tego sposobu |
| ES07872422T ES2753848T3 (es) | 2006-12-21 | 2007-12-20 | Procedimiento de gestión del número de visualizaciones, procesador de seguridad y terminal para este procedimiento |
| US12/520,339 US20090316896A1 (en) | 2006-12-21 | 2007-12-20 | Method for managing the number of visualizations, security processor and terminal for said method |
| EP07872422.6A EP2098073B1 (fr) | 2006-12-21 | 2007-12-20 | Procédé de gestion du nombre de visualisations, processeur de securité et terminal pour ce procédé |
| KR1020097012997A KR101378487B1 (ko) | 2006-12-21 | 2007-12-20 | 시각화의 수를 관리하기 위한 방법, 보안 프로세서, 및 상기 방법을 위한 단말기 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0611194A FR2910671B1 (fr) | 2006-12-21 | 2006-12-21 | Procede de gestion du nombre de visualisations,processeur de securite et terminal pour ce procede |
| FR0611194 | 2006-12-21 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2008096066A2 true WO2008096066A2 (fr) | 2008-08-14 |
| WO2008096066A3 WO2008096066A3 (fr) | 2009-03-05 |
Family
ID=38308610
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/FR2007/002137 Ceased WO2008096066A2 (fr) | 2006-12-21 | 2007-12-20 | Procede de gestion du nombre de visualisations, processeur de securite et terminal pour ce procede |
Country Status (9)
| Country | Link |
|---|---|
| US (1) | US20090316896A1 (fr) |
| EP (1) | EP2098073B1 (fr) |
| KR (1) | KR101378487B1 (fr) |
| CN (1) | CN101563920B (fr) |
| ES (1) | ES2753848T3 (fr) |
| FR (1) | FR2910671B1 (fr) |
| PL (1) | PL2098073T3 (fr) |
| TW (1) | TWI448979B (fr) |
| WO (1) | WO2008096066A2 (fr) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103248918B (zh) * | 2013-05-16 | 2015-12-02 | 浙江科技学院 | 集成基本数据、正常数据加扰的dvb条件发送装置 |
| CN104850605A (zh) * | 2015-05-05 | 2015-08-19 | 天脉聚源(北京)教育科技有限公司 | 一种快进后笔记文件中笔记的显示方法及装置 |
| FR3078223A1 (fr) * | 2018-02-16 | 2019-08-23 | Orange | Reception de flux representatif d'un contenu multimedia |
| CN116304189A (zh) * | 2022-12-21 | 2023-06-23 | 富联裕展科技(深圳)有限公司 | 一种excel文件中图像提取方法和电子设备 |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7562392B1 (en) * | 1999-05-19 | 2009-07-14 | Digimarc Corporation | Methods of interacting with audio and ambient music |
| US6564253B1 (en) * | 1999-05-07 | 2003-05-13 | Recording Industry Association Of America | Content authorization system over networks including searching and reporting for unauthorized content locations |
| EP1113609A4 (fr) * | 1999-05-19 | 2008-08-06 | Sony Corp | Appareil et procede de diffusion, appareil et procede de reception, et support |
| JP4880158B2 (ja) * | 1999-12-22 | 2012-02-22 | イルデト アイントホーフェン ベー フェー | データコンテンツへのアクセスを制御する条件付きアクセスシステム |
| EP1182874A1 (fr) * | 2000-08-24 | 2002-02-27 | Canal+ Technologies Société Anonyme | Système de protection de contenu numérique |
| TW540245B (en) * | 2000-10-26 | 2003-07-01 | Gen Instrument Corp | Enforcement of content rights and conditions for multimedia content |
| US7870592B2 (en) * | 2000-12-14 | 2011-01-11 | Intertainer, Inc. | Method for interactive video content programming |
| US8055899B2 (en) * | 2000-12-18 | 2011-11-08 | Digimarc Corporation | Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities |
| US7415440B1 (en) * | 2002-02-22 | 2008-08-19 | Entriq, Inc. | Method and system to provide secure key selection using a secure device in a watercrypting environment |
| FR2837055B1 (fr) * | 2002-03-06 | 2004-06-11 | Viaccess Sa | Protocole de controle d'acces, par plages de durees specifiques, a des informations embrouillees |
| JP2005537708A (ja) * | 2002-08-21 | 2005-12-08 | ディズニー エンタープライゼス インコーポレイテッド | デジタルホームムービーライブラリ |
| JP3737798B2 (ja) * | 2002-11-25 | 2006-01-25 | 株式会社東芝 | 送信装置、受信装置及び受信方法 |
| JP4430882B2 (ja) * | 2003-03-19 | 2010-03-10 | 富士通株式会社 | 複合メディアコンテンツの変換装置及び変換方法並びに複合メディアコンテンツ変換プログラム |
| CN1755727A (zh) * | 2004-09-27 | 2006-04-05 | 清华同方股份有限公司 | 一种卡拉ok点播系统按播放流付费的方法及其管理系统 |
-
2006
- 2006-12-21 FR FR0611194A patent/FR2910671B1/fr not_active Expired - Fee Related
-
2007
- 2007-12-07 TW TW096146796A patent/TWI448979B/zh not_active IP Right Cessation
- 2007-12-20 WO PCT/FR2007/002137 patent/WO2008096066A2/fr not_active Ceased
- 2007-12-20 PL PL07872422T patent/PL2098073T3/pl unknown
- 2007-12-20 CN CN2007800469116A patent/CN101563920B/zh not_active Expired - Fee Related
- 2007-12-20 ES ES07872422T patent/ES2753848T3/es active Active
- 2007-12-20 EP EP07872422.6A patent/EP2098073B1/fr not_active Not-in-force
- 2007-12-20 KR KR1020097012997A patent/KR101378487B1/ko not_active Expired - Fee Related
- 2007-12-20 US US12/520,339 patent/US20090316896A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| EP2098073B1 (fr) | 2019-08-14 |
| CN101563920B (zh) | 2012-05-02 |
| KR20090090356A (ko) | 2009-08-25 |
| CN101563920A (zh) | 2009-10-21 |
| PL2098073T3 (pl) | 2020-03-31 |
| US20090316896A1 (en) | 2009-12-24 |
| WO2008096066A3 (fr) | 2009-03-05 |
| FR2910671A1 (fr) | 2008-06-27 |
| FR2910671B1 (fr) | 2009-04-03 |
| TW200834441A (en) | 2008-08-16 |
| KR101378487B1 (ko) | 2014-03-27 |
| ES2753848T3 (es) | 2020-04-14 |
| TWI448979B (zh) | 2014-08-11 |
| EP2098073A2 (fr) | 2009-09-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1525748B1 (fr) | Procede et module electronique de transmission securisee de donnees | |
| EP3008905B1 (fr) | Procede d'identification de terminal dans un systeme de fourniture de contenus multimedia | |
| EP2060117B1 (fr) | Processeur de securite et procede et support d'enregistrement pour configurer le comportement de ce processeur | |
| EP1261969A1 (fr) | Dispositifs de lecture, d'enregistrement et de restitution de donnees numeriques dans un systeme de protection contre la copie desdites donnees | |
| EP1305948A1 (fr) | Methode de distribution securisee de donnees numeriques representatives d'un contenu multimedia | |
| EP1497986B1 (fr) | Methode de gestion des droits d'un contenu encrypte et stocke sur un enregistreur numerique personnel | |
| EP1495637B1 (fr) | Methode de stockage securise de donnees encryptees | |
| EP2103123B1 (fr) | Procédé de controle d'acces a un contenu numerique embrouille | |
| EP2633677B1 (fr) | Procede de reception d'un contenu multimedia embrouille a l'aide de mots de controle et captcha | |
| FR2954875A1 (fr) | Procedes de dechiffrement, de transmission et de reception de mots de controle, support d'enregistrement et serveur pour ces procedes | |
| EP3380983B1 (fr) | Procédé d'identification de processeurs de sécurité | |
| EP2098073B1 (fr) | Procédé de gestion du nombre de visualisations, processeur de securité et terminal pour ce procédé | |
| WO2011138333A1 (fr) | Procedes de dechiffrement, de transmission et de reception de mots de controle, support d'enregistrement et serveur de mots de controle pour la mise en oeuvre de ces procedes | |
| EP1900211B1 (fr) | Methode et dispositif de controle d'acces a des donnees chiffrees | |
| FR2888355A1 (fr) | Procede de controle de droits de consommation du type "n consommations autorisees" d'un contenu numerique audio et/ou video et dispositif mettant en oeuvre ce procede | |
| WO2007104876A1 (fr) | Procédé pour la distribution sécurisée de séquences audiovisuelles, décodeur et système pour la mise en œuvre de ce procédé | |
| WO2015018775A1 (fr) | Procede de fourniture d'une licence dans un systeme de fourniture de contenus multimedias | |
| EP2245854A1 (fr) | Procédé d'affichage de contenus multimédia à perturbations variables en fonction de droits locaux de récepteurs/décodeurs | |
| WO2003019899A2 (fr) | Reseau numerique local, procedes d'installation de nouveaux dispositifs et procedes de diffusion et de reception de donnees dans un tel reseau | |
| EP2279610B1 (fr) | Procedes de reception et d'emission d'un contenu multimedia, recepteur, emetteur et support d'enregistrement et processeur de securite pour ce procede | |
| EP2223524B1 (fr) | Procédé de conditionnement et de contrôle d'accès à des contenus en codage hiérarchique, processeur et émetteur pour ce procédé | |
| EP2326035B1 (fr) | Procédé de traitement par un module de sécurité de messages de contrôle d'accès à un contenu et module de sécurité associé | |
| EP2334007A1 (fr) | Procédé de déchiffrement de données par un équipement utilisateur comportant un terminal et un module de sécurité | |
| EP1438855A2 (fr) | Procede de verification de recepteurs de television a controle d'acces et recepteur correspondant | |
| EP2061243A1 (fr) | Procédé pour l'accés á des données á accés conditionnel |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 200780046911.6 Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07872422 Country of ref document: EP Kind code of ref document: A2 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2007872422 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 12520339 Country of ref document: US |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 3572/CHENP/2009 Country of ref document: IN Ref document number: 1020097012997 Country of ref document: KR |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
