TW200806036A - Selective and persistent application level encryption for video provided to a client - Google Patents
Selective and persistent application level encryption for video provided to a client Download PDFInfo
- Publication number
- TW200806036A TW200806036A TW96100443A TW96100443A TW200806036A TW 200806036 A TW200806036 A TW 200806036A TW 96100443 A TW96100443 A TW 96100443A TW 96100443 A TW96100443 A TW 96100443A TW 200806036 A TW200806036 A TW 200806036A
- Authority
- TW
- Taiwan
- Prior art keywords
- content
- encrypted
- content stream
- unencrypted
- selectively
- Prior art date
Links
- 230000002085 persistent effect Effects 0.000 title description 2
- 238000000034 method Methods 0.000 claims abstract description 26
- 239000000463 material Substances 0.000 claims description 19
- 230000009471 action Effects 0.000 claims description 12
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 claims description 8
- 239000010931 gold Substances 0.000 claims description 8
- 229910052737 gold Inorganic materials 0.000 claims description 8
- 238000013475 authorization Methods 0.000 claims description 7
- 230000007246 mechanism Effects 0.000 claims description 4
- 230000002441 reversible effect Effects 0.000 claims description 3
- 239000007858 starting material Substances 0.000 claims 1
- 230000037406 food intake Effects 0.000 abstract description 2
- 238000001824 photoionisation detection Methods 0.000 abstract 2
- 238000012545 processing Methods 0.000 description 27
- 238000004891 communication Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 4
- 230000006835 compression Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 238000013478 data encryption standard Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 241000962514 Alosa chrysochloris Species 0.000 description 1
- 241000251730 Chondrichthyes Species 0.000 description 1
- 241000845082 Panama Species 0.000 description 1
- 241000282320 Panthera leo Species 0.000 description 1
- 241000270295 Serpentes Species 0.000 description 1
- 241001441724 Tetraodontidae Species 0.000 description 1
- 101150055569 arc4 gene Proteins 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000003973 irrigation Methods 0.000 description 1
- 230000002262 irrigation Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- WVMLRRRARMANTD-FHLIZLRMSA-N ram-316 Chemical compound C1=CCC[C@@]2(O)[C@H]3CC4=CC=C(OC)C(O)=C4[C@]21CCN3C WVMLRRRARMANTD-FHLIZLRMSA-N 0.000 description 1
- 238000012958 reprocessing Methods 0.000 description 1
- 229910052594 sapphire Inorganic materials 0.000 description 1
- 239000010980 sapphire Substances 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Landscapes
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Description
200806036 九、發明說明: 【發明所屬之技術領域】 相關申請案之交互參照 本申請案主張序號為60/757,055的臨時申請案(名稱為 5 Selective And Persistent Application Level Encryption200806036 IX. Description of the invention: [Technical field to which the invention pertains] Cross-Reference to Related Applications This application claims the provisional application Serial No. 60/757,055 (named 5 Selective And Persistent Application Level Encryption)
For Video Provided To A Client,,,於2006年 1 月 6 日提出申 睛)之利益。該申請案之較早申請日之利益在35 u s c.备 U9(e)及37 C.F.R· §1.78下被主張,且其進一步以參照方 式被併入此處。 10 發明領域 本發明一般是關於計算安全性,且尤其是但不僅只是 關於基於一選擇準則選擇性加密内容,該選擇準則包括保 持特技播放賓料’及將有關的串流資料保持清晰(in the clear)。 t Tltr 15 發明背景 最近電信及電子工業内的進步,且尤其是數位壓縮技 術、網路及硬碟機容量的改進,已導致提供給使用者家庭 的新數位服務之成長。例如,此等進步已提供幾百個電纜 電視頻道給使用者,藉由壓縮數位資料及數位視訊、透過 20習知的同軸電繞電視頻道傳送該被壓縮的數位信號,以及 繼而在該使用者之接收器内解壓縮該等信號。最近已受到 廣泛關注的此等技術之一應用包括一使用者在其内可與一 服務經營者進行通訊以請求媒體内容的隨選視訊(V0D)系 統,該被請求的内容被路由(r〇uted)給該使用者之家庭以娛 5 200806036 樂。該服務鉍營者一般自一上游(upstream)内容提供者(例 如,一内容擁有者、分散者或其類似者)獲得内容。 然而,為了阻止此内容被未授權使用,服務經營者、 内容提供者、擁有者等可使用被稱為條件存取(conditi〇nal 5 access)的一服務。條件存取使一提供者能夠限制給被選定 使用者的被選擇内各。這可藉由(例如)加密該内容而獲得。 一内容提供者、内容擁有者或其類似者可能希望在一分散 串流内儘早地加密該内容,以保護該内容的隱私。 然而,如今的使用者可期望對該内容執行各種動作, 10包括通過該内容之一部分的快進、快速倒轉及其類似者。 此“特技播放(trick plays”一般藉由產生來自該内容的額外 檔案資訊而被管理。當該内容被加密時,此等特技播放檔 案之產生可能是困難的。因此,本發明是關於此等考慮及 其他考慮而作出的。 15 【^^明内^!】 發明概要 一種用於管理内容加密的伺服器裝置,包含·· 一收發器,用於在另一計算裝置之間接收且發送資訊; 一處理器,與該收發器進行通訊;以及 20 一 §己憶體,與該處理器進行通訊,且用於儲存資料以 及機器指令,該等機器指令使該處理器執行多數個操作, 該等操作包括: 接收一未加密内容串流; 選擇性加密該未加密内容串流中的至少一部分,同時 6 200806036 5 基於使該未加密内容串流中的至少特技播放資料不被加密 的一選擇準則,保持該未加密内容串流中的至少另一部分 不被加密;以及 將一授權控制訊息(ECM)插入該被選擇性加密内容串 流内。 圖式簡单說明 • 本發明之非限制及非詳盡實施例參考以下圖示被描 述。在該等圖中,類似的參考標號表示類似的部分,除非 被指定。 10 為了更好地理解本發明,給出本發明之以下詳細描述 之參考,其需結合附圖被閱讀,其中: 第1圖顯示了說明用於實踐本發明的一環境之一實施 例的一功能方塊圖; 第2圖顯示了可被包括在實施本發明的一系統内的一 15 伺服器裝置的一實施例; 第3圖顯示了可被包括在實施本發明的一系統内的一 客戶裝置的一實施例; 第4圖說明一般顯示用於加密展示可能的擾亂控制的 一傳輸封包的一實施例的功能圖; 20 第5圖說明一般顯示一傳輸串流之被選擇性加密部分 的一實施例的功能圖; 第6圖說明一般顯示依據本發明以選擇性加密一傳輸 串流之部分的一程序之一實施例的一邏輯流程圖。 1:實施方式】 7 200806036 較佳實施例之詳細說明 現在將參照是其一部分的附圖更全面地描述本發明, 該附圖透過說明顯示了本發明可被實踐的特定示範性實施 例。然而,本發明可以許多不同的形式實施,且不應被解 5釋為限於此處所闡述的該等實施<列;而是,此等實施例可 被提供使得此揭露是徹底且全面的,且對於該項技術領域 内具有通常知識者將傳達本發明之範圍。在其他方面,本 發明可被實施為方法或裝置。因此,本發明可採用一整個 硬體實施例、一整個軟體實施例或結合軟體及硬體層面的 1〇 一實施例之形式。因此,以下描述描述不應被理解為具有 限制的含義。 在該說明書及申請專利範圍内,以下詞語具有此處明 確相關的意思,除非該内容清楚地規定。此處所使用的片 語‘在一實施例中”並不需要表示相同的實施例,雖然其 15 可能表示相同的實施例。如此處所使用,詞語“或者,,是一 包含“或者”的運算,且等效於詞語“及/或,,,除非内文清楚 地規定。詞語“基於,,不是唯一地,且允許基於沒有被描述 的額外因素,除非内文清楚地規定。除此之外,在整個說 明書中,“一,,及“該,,之含義包括複數參考。“在…内,,的含義 20包括“在···内,,及“在…上,,。 簡要陳述,本發明是關於允許將已加密内容吸入 (ingestion)如一 VOD伺服器、個人視訊記錄器(PVR)或其他 數位程式裝置之系統、裝置及方法。pVRs、V0Ds及其類 似者之吸入包含特技播放索引之產生(一般不可能以傳統 8 200806036 視訊擾亂或加密技術產生)L本發明基於各種選擇準 則,選擇性地加密一内容串流之部分。例如,在一實施例 中,該等選擇準則包括:使該被選定部分保持清晰或不被 加密,包括具有一封包化初級串流(PES)標頭的封包,或具 5有各種特技播放貧料(例如圖像開始、圖像組㈤⑽)開始、 序列開始、序列結束資料或其類似者)的視訊封包。另一選 擇準則可使與一程式關聯表(PAT)、程式映射表(ρΜτ)或其 類似者有關的封包識別符(piD)保持清晰。基於該等選擇準 則,該内容串流之其他部分可被選擇性地加密,包括下列 1〇但不限於下列:視訊及/或音訊PID或其他視訊及/或音訊部 分。又在另一實施例中,該等選擇準則可表示隨機視訊及/ 或音訊有效負載可被加密,而其他視訊及/或音訊有效負載 可保持不被加密(處於清晰中)。此等選擇準則可(例如)被用 以支持像是視訊盒(STB)即時解密的活動,或類似的活動, 5忒等活動被認為是資源受限的。除此之外,在一實施例中, 該選擇性加密是在一傳輸串流(TS)封包階層。 除此之外,本發明可將授權控制訊息(ECM)封包插入 到可使用加密/解密金錄旋轉的内容串流中。例如,在一實 施例中,本發明可使用偶及/或奇擾亂控制位元,其可被用 2〇 、 以表示一選擇性旋轉,或改變加密之一類型或使用,以及 相關的加密金錄。 而且’在一實施例中,該ECM可包括兩金餘,一金餘 用於一目前加密週期(cryptoperiod),且另一金鑰用於下一 加密週期。該ECM傳輸可在一内容串流内偏移負半個加密 200806036 週期,其中該等ECM以每秒一預定數目之次數被插入該串 流。在一實施例中,每秒該預定數目之次數是基於(至少部 分)一程式時脈參考(PCR)。在一實施例中,該ECM可被插 入一傳輸串流(在大約每個I圖框標頭之後)。 5 然後該被選擇性加密内容串流可被用以產生特技播放 檔案’例如一快進檔案、快速倒轉檔案等。除此之外,該 被選擇性加密内容串流可被用以產生一對應索引檔案 (index file),該對應索引檔案表示該内容串流及該等特技播 放檔案内的有關内容圖框之位置。藉由使用該被選擇性加 10密内容串流,索引檔案可容易產生,不需要重新對内容串 流索引,從而減少整體的處理成本、時間,以及重新處理 内容串流之可能性。而且,本發明能夠在吸入到一v〇D伺 服器或其類似者之前執行選擇性加密,進一步增強該内容 之安全性。除此之外,本發明能夠將此選擇性加密應用到 15 一廣播環境,包括在如一 STB或其類似者内可具有一 PVR 的廣播環境。For Video Provided To A Client,,, on January 6, 2006, the benefits of the application. The benefit of the earlier filing date of this application is claimed under 35 u s c. U9(e) and 37 C.F.R. §1.78, and is further incorporated herein by reference. 10 FIELD OF THE INVENTION The present invention relates generally to computational security, and more particularly, but not exclusively, to selectively encrypting content based on a selection criterion, including maintaining a trick play guest' and keeping the relevant streaming data clear (in the Clear). t Tltr 15 BACKGROUND OF THE INVENTION Recent advances in the telecommunications and electronics industries, and in particular the improvements in digital compression technology, network and hard disk drive capacity, have led to the growth of new digital services offered to users' homes. For example, such advances have provided hundreds of cable television channels to users, by compressing digital data and digital video, transmitting the compressed digital signal through 20 known coaxial electrical television channels, and then to the user The signals are decompressed in the receiver. One of the technologies of recent interest that has received widespread attention includes a video on demand (VOD) system in which a user can communicate with a service operator to request media content, the requested content being routed (r〇 Uted) to the user's family to entertain 5 200806036 music. The service sponsor typically obtains content from an upstream content provider (e.g., a content owner, a scatterer, or the like). However, in order to prevent this content from being used unauthorizedly, a service provider, content provider, owner, etc. may use a service called conditional access (conditi〇nal 5 access). Conditional access enables a provider to be restricted to selected ones of the selected users. This can be obtained, for example, by encrypting the content. A content provider, content owner, or the like may wish to encrypt the content as early as possible within a distributed stream to protect the privacy of the content. However, today's users may desire to perform various actions on the content, 10 including fast forward, fast reverse, and the like through a portion of the content. This "trick plays" is generally managed by generating additional file information from the content. The generation of such trick play files may be difficult when the content is encrypted. Therefore, the present invention is related to such Considered and other considerations. 15 [^^明内^!] SUMMARY OF THE INVENTION A server device for managing content encryption, comprising a transceiver for receiving and transmitting information between another computing device a processor for communicating with the transceiver; and a memory device for communicating with the processor and for storing data and machine instructions, the machine instructions causing the processor to perform a plurality of operations, The operations include: receiving an unencrypted content stream; selectively encrypting at least a portion of the unencrypted content stream, and simultaneously selecting a selection based on causing at least the trick play data in the unencrypted content stream to be unencrypted a criterion of keeping at least another portion of the unencrypted content stream unencrypted; and inserting an authorization control message (ECM) into the selectively encrypted BRIEF DESCRIPTION OF THE DRAWINGS BRIEF DESCRIPTION OF THE DRAWINGS The non-limiting and non-exhaustive embodiments of the present invention are described with reference to the following drawings in which like reference numerals refer to the The invention is described with reference to the accompanying drawings, in which: FIG. 1 Figure 2 shows an embodiment of a 15 server device that can be included in a system embodying the present invention; Figure 3 shows a client device that can be included in a system embodying the present invention. Embodiments; FIG. 4 illustrates a functional diagram generally showing an embodiment of a transport packet for encrypting possible spurious control; 20 FIG. 5 illustrates an embodiment of a selectively encrypted portion of a transport stream generally shown Functional diagram; Figure 6 illustrates a logic flow diagram generally showing one embodiment of a procedure for selectively encrypting a portion of a transport stream in accordance with the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT The present invention will now be described more fully hereinafter with reference to the accompanying drawings in which FIG. The form is implemented and should not be construed as being limited to the implementations set forth herein; rather, such embodiments may be provided such that the disclosure is thorough and comprehensive, and Those skilled in the art will be able to convey the scope of the present invention. In other aspects, the present invention may be embodied as a method or apparatus. Thus, the present invention may employ an entire hardware embodiment, an entire software embodiment, or a combination of software and hardware layers. The form of the embodiment is therefore not to be construed as limiting. Within the meaning of this specification and the patent application, the following words have the meanings expressly stated herein unless otherwise clearly stated. The phrase 'in an embodiment', as used herein, does not necessarily denote the same embodiment, although 15 may represent the same embodiment. As used herein, the word "or," is an operation containing an "or", And equivalent to the word "and/or, unless the context clearly dictates. The word "based on, is not unique, and is based on additional factors not described unless the context clearly dictates otherwise." In addition, throughout the specification, “a,, and “the,” meaning includes plural references. "In..., the meaning 20 includes "in," and "on,". Briefly stated, the present invention relates to allowing ingestion of encrypted content such as a VOD server, personal video recording. System, device and method for PVR or other digital program devices. The inhalation of pVRs, V0Ds and the like includes the generation of a trick play index (generally impossible to generate by conventional 8 200806036 video scrambling or encryption technology). Various selection criteria for selectively encrypting portions of a content stream. For example, in an embodiment, the selection criteria include: keeping the selected portion clear or unencrypted, including having a packetized primary stream ( PES) header packet, or video packet with 5 various tricks (such as image start, image group (5) (10)) start, sequence start, sequence end data, or the like). Another selection criterion can be used. The packet identifier (piD) associated with a program association table (PAT), a program map table (ρΜτ), or the like remains clear. Based on the selection criteria, the content stream is Portions may be selectively encrypted, including but not limited to the following: video and/or audio PID or other video and/or audio portions. In yet another embodiment, the selection criteria may indicate random video and/or Or the audio payload can be encrypted while other video and/or audio payloads can remain unencrypted (in clarity). These selection criteria can be used, for example, to support instant decryption such as video box (STB). Activities, or similar activities, are considered resource-constrained. In addition, in one embodiment, the selective encryption is at a transport stream (TS) packet level. The present invention can insert an Entitlement Control Message (ECM) packet into a content stream that can be rotated using an encryption/decryption record. For example, in one embodiment, the present invention can use even and/or odd scrambling control bits. It can be used to indicate a selective rotation, or to change one type or use of encryption, and associated encryption records. And in an embodiment, the ECM can include two gold sums, one for gold Yuyi Current Encryption Week (cryptoperiod), and another key is used for the next encryption cycle. The ECM transmission can be offset by a negative half encryption 200806036 period within a content stream, wherein the ECMs are inserted a predetermined number of times per second. In one embodiment, the predetermined number of times per second is based on (at least in part) a program clock reference (PCR). In an embodiment, the ECM can be inserted into a transport stream (at approximately The I-frame header is followed by 5. 5 Then the selectively encrypted content stream can be used to generate a trick play file, such as a fast forward file, a fast reverse file, etc. In addition, the selectively encrypted content The stream can be used to generate a corresponding index file that represents the content stream and the location of the content frame within the trick play files. By using the selectively encrypted content stream, the index file can be easily generated without re-indexing the content stream, thereby reducing the overall processing cost, time, and the possibility of reprocessing the content stream. Moreover, the present invention is capable of performing selective encryption prior to inhalation to a v〇D servo or the like, further enhancing the security of the content. In addition, the present invention is capable of applying this selective encryption to a broadcast environment including a broadcast environment having a PVR such as an STB or the like.
第1圖顯示了本發明可被實施的作業環境100之一實施 例的一功能方塊圖。作業環境100只是一適合的作業環境之 例子’且並不意指建議有關本發明之使用或功能之範圍 的任何限制。因此,在沒有背離本發明之範圍或精神下, /、 K所周知的環境及配置可被使用。 如圖所不’作業環境100包括内容提供伺服器101、VOD k擇11加密伺服器(SES)102、網路105以及客戶裝置106。 10 200806036 、、罔路105與以下進行通訊,且能夠致能ses ΐ()2、内容提供 伺服器101以及客戶裝置1〇6之間的通訊 。SES 102也與内容 提供伺服器101進行通訊。 内容提供伺服器101實質上包括可被配置給生產者、發 • 5展者以及媒體内容(可被分散給客戶裝置106)之擁有者使用 • 的任何計算裝置。此内容包括下列但不限於下列:移動圖 像、電影、視訊、音樂、計次付費(ppv)、、互動媒 • 體、音訊、靜態影像、本文、圖形及用於一客戶裝置(例如, /私五▲一/〜使用者的其他形式的數位内容。内容提 0 t、伺服& 1G1也可包括獲得自_内容擁有者複製及分散該 η合w催q〜商業仃為、系統及其類似者。内容提供伺服 器101可獲得自-或多個内容擁有者複製及分散的權利。内 谷提供飼服H1G1可重新包裝、儲存及排程内容以連續銷 售、分散,且授權給其他内容提供者、客戶裝置1〇6之使用 15 者,或其類似者。 _ 在-實施例中,内容提供伺服器1〇1可提供未加密内容 - 、給SES 102以用於選擇性加密該内容。在另一實施例中,娜 102可、%而提供该被選擇性力σ密内容給内容提供飼服器 101。内容提供伺服器101可將該被接收的被選擇性加密内 20容串流提供給客戶裝置106。在一實施例中,該被加密内容 串流可以一廣播方式被發送給客戶裝置106,其中客戶裝置 106可繼而被致能解密該被接收的内容串流。 可如同内容提供伺服器101般運作的裝置包括個人電 月自桌上型電知、多處理器糸統、基於微處理器或可程式 11 200806036 化消費電子產品、網路pc、伺服器,以及其類似者。 以下結合第2圖更詳細描述SES 1〇2。然而,簡而言之, SES 102實質上包括被配置以接收未加密内容且提供一被 選擇性加密内容串流的任何計算裝置。在一實施例中,SES 5 102可接收來自内容提供伺服器101的未加密内容。然而, 本發明不限於此’且SES 102也可接收來自各種其他來源的 未加密内容,包括:例如,來自一不同内容提供者的該網 路105上的一可攜式儲存媒體,或其類似者。無論在任何情 況下’在一實施例中,1〇2可提供選擇性加密内容給内 10容提供者101以分散給客戶106。在另一實施例中,SES 102 可提供選擇性加密内容給客戶106,或其類似者。在一實施 例中,SES 102可使用一程序(與以下結合第6圖所描述的程 序600實質上類似)。 雖然SES 102與内容提供伺服器101被說明是不同的裝 15置,但是本發明不限於此,且在一實施例中,在沒有背離 本發明之範圍或精神下,SES 102與内容提供伺服器101可 被整合至一個單一計算裝置,或者甚至被分散給多於兩個 計算裝置。 網路105被配置以使各種計算裝置能夠發送/接收訊 20息,該等訊息包括檔案、内容串流或其類似者。網路1〇5被 致能為使用任何形式的電腦可讀媒體以將資訊從一電子裝 置傳送給另一裝置。而且,網路1〇5可包括網際網路,除了 區域網路(LANs)、廣域網路(WANs)之外、還有直接連接(例 如透過一通用串連匯流排(USB)埠),及其他形式的電腦可 12 200806036 讀媒體或其等的組合。在一組相互連接的LAN上(包括該等 基於不同的架構及協定之LAN),一路由器作為LAN之間的 鏈結,從而使訊息從一 LAN被發送到另一 LAN。而且,該 等LAN内的通訊鏈結一般包括絞合線對或同軸電纟覽,而網 5 路之間的通訊鏈結可使用類比電話線、完全或部分專用數 位線(包括ΤΙ、T2、T3及T4)、整合服務數位網路(ISDN)、 數位用戶線(DSL)、無線鏈結(包括衛星鏈結),或為該項技 術領域内具有通常知識者所知的其他通訊鏈結。此外,遠 端電細及其他相關的電子裝置可透過一數據機及臨時電話 10 鍵結被遠端連接到LAN或WAN。網路105可進一步使用多數 個存取技衛’包括用於蜂巢式系統的第2代(2G)、第3代(3G) 無線電存取、WLAN、無線路由器(WR)網及其類似者。如 2G、3G及將來存取網路之存取技術可使計算裝置之廣域範 圍具有各種程度的移動性。例如,網路1〇5可致能透過一無 15線電網路存取的無線電連接,例如行動通訊之全球系統 (GSM)、通用封包無線電服務(GpRS)、增強資料gsm環境 (EDGE)、寬頻分碼多重存取(WCDMA),及其類似者。實 質上,網路1〇5包括任何通訊方法,資訊可藉以在一計算裝 置與另一計算裝置之間傳輸。 20 $外,通訊媒體一般實施電腦可讀指令、資料結構、 程式模組,或者在一已調變資料信號(例如一載波)内的其他 資料、資料信號,或其他傳輸機制,且包括任何資訊遞送 媒體。詞語“已調變資料信號,,及“載波信號,,包括具有其特 徵集合中的-或多個的一信號,或者在該信號内以編碼資 13 200806036 訊、指令、資料及類似的方式改變者。藉由舉例,通訊媒 體包栝有線媒體(例如雙絞線對、同軸電纜、光纖、波導), 以及其他有線媒體及無線媒體(例如聲頻、RF、紅外線及其 他無線媒體)。 5 雖然本發明說明了内容透過網路105被發送給客戶掌Figure 1 shows a functional block diagram of one embodiment of a work environment 100 in which the present invention can be implemented. The operating environment 100 is merely an example of a suitable operating environment' and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Therefore, the environment and configuration well known to /, K can be used without departing from the scope or spirit of the invention. The operating environment 100 includes a content providing server 101, a VOD k11 encryption server (SES) 102, a network 105, and a client device 106. 10 200806036 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , . The SES 102 also communicates with the content providing server 101. The content providing server 101 essentially includes any computing device that can be configured for use by the producer, the exhibitor, and the owner of the media content (which can be distributed to the client device 106). This includes, but is not limited to, the following: mobile images, movies, video, music, pay-per-view (ppv), interactive media, audio, still images, text, graphics, and for a client device (eg, / Private five ▲ one / ~ user's other forms of digital content. Content mention 0 t, Servo & 1G1 may also include obtaining from the _ content owner to copy and distribute the η合w 催q~ commercial 仃, system and its Similarly, the content providing server 101 can obtain the right to copy and distribute from one or more content owners. The inner valley provides the feeding service H1G1 repackable, storage and scheduling content for continuous sale, distribution, and authorization to other content. Provider, client device 1-6, or the like. _ In an embodiment, the content providing server 1-1 can provide unencrypted content - to the SES 102 for selective encryption of the content In another embodiment, Na 102 can provide the selected force σ dense content to the content providing feeder 101. The content providing server 101 can receive the selectively encrypted internal 20 string Stream is provided to the customer 106. In an embodiment, the encrypted content stream can be transmitted to the client device 106 in a broadcast manner, wherein the client device 106 can then be enabled to decrypt the received content stream. 101-like devices include personal power monthly desktop information, multi-processor systems, microprocessor-based or programmable 11 200806036 consumer electronics, network PCs, servers, and the like. Figure 2 illustrates SES 1〇2 in more detail. However, in short, SES 102 essentially includes any computing device configured to receive unencrypted content and provide a stream of selectively encrypted content. In an embodiment The SES 5 102 can receive unencrypted content from the content providing server 101. However, the invention is not limited thereto and the SES 102 can also receive unencrypted content from various other sources, including, for example, from a different content provider. A portable storage medium on the network 105, or the like. In any case, 'in one embodiment, 1 〇 2 can provide selective encryption of content to the inside 10 The provider 101 is distributed to the client 106. In another embodiment, the SES 102 can provide selective encryption of content to the client 106, or the like. In an embodiment, the SES 102 can use a program (in conjunction with the following) The procedure 600 described in the figure is substantially similar. Although the SES 102 and the content providing server 101 are illustrated as being different, the invention is not limited thereto, and in an embodiment, without departing from the invention In scope or spirit, the SES 102 and content providing server 101 can be integrated into a single computing device or even distributed to more than two computing devices. The network 105 is configured to enable various computing devices to transmit/receive messages 20 Information, such as files, content streams or the like. Network 1〇5 is enabled to use any form of computer readable media to transfer information from one electronic device to another. Moreover, the network 1〇5 can include the Internet, in addition to regional networks (LANs), wide area networks (WANs), and direct connections (such as through a universal serial bus (USB) port), and others. The form of the computer can be 12 200806036 read media or a combination thereof. On a set of interconnected LANs (including those based on different architectures and protocols), a router acts as a link between the LANs, thereby enabling messages to be sent from one LAN to another. Moreover, the communication links in the LANs generally include twisted pairs or coaxial power connections, and the communication links between the five channels can use analog telephone lines, full or partial dedicated digital lines (including ΤΙ, T2, T3 and T4), Integrated Services Digital Network (ISDN), Digital Subscriber Line (DSL), wireless link (including satellite links), or other communication links known to those of ordinary skill in the art. In addition, remote terminals and other related electronic devices can be remotely connected to a LAN or WAN via a modem and a temporary telephone 10 bond. The network 105 can further utilize a plurality of access technologies 'including 2nd generation (2G), 3rd generation (3G) radio access, WLAN, wireless router (WR) networks and the like for cellular systems. Access technologies such as 2G, 3G, and future access networks can provide varying degrees of mobility across the wide range of computing devices. For example, Network 1〇5 can enable radio access via a 15-wire grid, such as Global System for Mobile Communications (GSM), General Packet Radio Service (GpRS), Enhanced Data gsm Environment (EDGE), Broadband Code Division Multiple Access (WCDMA), and the like. In essence, the network 1 〇 5 includes any communication method by which information can be transferred between one computing device and another computing device. In addition, the communication medium generally implements computer readable instructions, data structures, program modules, or other data, data signals, or other transmission mechanisms within a modulated data signal (eg, a carrier), and includes any information. Delivery media. The words "modulated data signal," and "carrier signal, including a signal having - or more of its feature set, or within the signal are encoded by the code, 200806036, instructions, data, and the like. By. By way of example, communication media includes wired media (e.g., twisted pair, coaxial cable, fiber optic, waveguide), as well as other wired and wireless media (e.g., audio, RF, infrared, and other wireless media). 5 Although the present invention illustrates that content is sent to the client through the network 105
置106,但是本發明不限於此。例如,實質上利用任何其他 内容遞送媒體(包括下列但不限於下列:CD、DVD、磁帶、 電子記憶體裝置,或其類似者),該内容也可被提供。 一客戶裝置106之一實施例在以下結合第3圖被更詳細 10 地描述。然而 15 20 透過一網路自另一計算裝置接收内容的任何計算裝置,例 如,内容提供伺服器101、SES 102,或者其類似者。客戶 裝置106也可包括能夠利用其他機制接收該内容的任何計 算裝置,包括下列但不限於下列:CD、DVD、磁帶、電子 記憶體裝置,或其_者。該組此等裝置可包括-般利用 -有線通訊媒體連接的裝置,例如個人電腦、多處理器系 統、基於微處理器或可程式化消費電子產品、網路PC,或 =Γ組此等裝置也可包括-般利用-無線通訊媒 接2裳置’例如,行動電話、智慧電話、傳呼機、對 _、_裝置、紅外線⑽裝置、⑶、包含-或多 個剷述裝置的整人梦罢 〆 1置及類似的裝置。客戶裝置106也可是 月匕夠利用有線或無線 PDA 媒體連接的任何裝置,例如- PDA、小型Pc、隨身 破配置以透過一有線及/或無 綠通Λ媒體接收及播放内 耵任何其他裝置。類似地,客 14 200806036 5 • 戶裝置106可使用任何各種裝置享受此内容,包括下列但不 限於下列:一電腦顯示器系統、一音訊系統、——點唱機、 隨選視訊盒(STB)、一電視、視訊顯示器裝置、或類似的裝置。 客戶裝置106可包括被配置以使一終端使用者能夠接 收媒體及播放該被接受内容的客戶應用程式。該客戶應用 程式也可提供其他動作,包括下列但不限於下列;使該客 戶裝置之其他元件能夠執行、致能與另一元件、裝置、終 端使用者及類似裝置的介面。 在一實施例中,該客戶應用程式可選擇性加密已解密 10 内容。例如,客戶裝置106可接收來自内容提供伺服器101 的已加密内容,以及/或來自SES 102的被選擇性加密内 容。然後該客戶應用程式可致能該被選擇性加密内容之解 密以給客戶裝置106使用。 然而,該客戶應用程式也可被配置以藉由連續地選擇 15 性加密該被暴露未加密内容之至少一部分,確保該已解密 内容之保護。在一實施例中,該客戶應用程式也可使用與 以下結合第6圖所描述的程序600實質上類似的程序,以執 行其等動作中的至少一些。 說明性伺服器環境 20 第2圖顯示了依據本發明之一實施例的一伺服器裝置 之一實施例。伺服器裝置200可包括比被顯示的元件更多的 元件。然而,所顯示的此等元件足夠揭露用於實踐本發明 的一說明性實施例。例如,伺服器裝置200可表示第1圖之 SES 102。 15 200806036 伺服器裝置200包括處理單元212、視訊顯示轉接器 214、及-大容量記憶體,此等所有裝置彼此透過匯流排222 進行通訊。該大容量記憶體一般包括RAM 216、r〇m 232, 及一或多個永久大容量儲存裝置(例如,硬碟機228)、磁帶 5機、光碟機、及/或軟碟機。該大容量記憶體儲存用於控制 伺服器裝置200之運作的作業系統22〇。任何通用作業系統 可被使用。基本輸入/輸出系統(“扮〇8,,)218也被提供用於控 制伺服器裝置200之低階運作。如第2圖所描述,伺服器裝106 is set, but the invention is not limited thereto. For example, the content may also be provided by substantially any other content delivery medium (including but not limited to the following: CD, DVD, magnetic tape, electronic memory device, or the like). An embodiment of a client device 106 is described in greater detail below in conjunction with FIG. However, 15 20 any computing device that receives content from another computing device over a network, such as content providing server 101, SES 102, or the like. Client device 106 may also include any computing device capable of receiving the content using other mechanisms, including but not limited to the following: CD, DVD, magnetic tape, electronic memory device, or the like. The set of such devices may include devices that are generally connected to a wired communication medium, such as a personal computer, a multi-processor system, a microprocessor-based or programmable consumer electronics product, a network PC, or a group of such devices. It can also include a general use-wireless communication medium, such as a mobile phone, a smart phone, a pager, a _, a device, an infrared (10) device, (3), an in-person dream, or a plurality of shovel devices. Dismissal 1 and similar devices. The client device 106 can also be any device that is connected to the wired or wireless PDA media, such as a PDA, a small PC, or a portable configuration to receive and play any other device through a wired and/or greenless media. Similarly, the customer device 106 can enjoy the content using any of a variety of devices, including the following but not limited to the following: a computer display system, an audio system, a jukebox, a video on demand (STB), a A television, video display device, or the like. Client device 106 can include a client application configured to enable an end user to receive media and play the accepted content. The client application may also provide other actions, including but not limited to the following; enabling other components of the client device to perform, interface with another component, device, terminal user, and the like. In one embodiment, the client application can selectively encrypt the decrypted 10 content. For example, client device 106 can receive encrypted content from content providing server 101, and/or selectively encrypted content from SES 102. The client application can then enable decryption of the selectively encrypted content for use by client device 106. However, the client application can also be configured to ensure protection of the decrypted content by continuously selecting at least a portion of the exposed unencrypted content. In an embodiment, the client application may also use a program substantially similar to the one described below in connection with Figure 6, to perform at least some of its actions. Illustrative Server Environment 20 FIG. 2 shows an embodiment of a server device in accordance with an embodiment of the present invention. Server device 200 can include more components than the components being displayed. However, the elements shown are sufficient to disclose an illustrative embodiment for practicing the invention. For example, server device 200 can represent SES 102 of Figure 1. 15 200806036 The server device 200 includes a processing unit 212, a video display adapter 214, and a large-capacity memory, all of which communicate with each other through the bus bar 222. The mass storage device typically includes RAM 216, r〇m 232, and one or more permanent mass storage devices (e.g., hard disk drive 228), magnetic tape drives, optical disk drives, and/or floppy disk drives. The mass storage device stores an operating system 22 for controlling the operation of the server device 200. Any general operating system can be used. A basic input/output system ("dress 8,") 218 is also provided for controlling the low-level operation of the server device 200. As depicted in Figure 2, the server is loaded
於包括TCP/IP 10協定的各種通訊協定)與網際網路、或一些其他通訊網路(例 如第1圖内的網路105)進行通訊。網路介面單元21〇有時被 稱為收發器、收發裝置、網路介面卡(NIC)以及其類似者。 伺服器裝置200也可包括用於傳送及接收電子郵件的 SMTP處理應用程式。伺服器裝置2〇〇也可包括用於接收且 15處理HTTP請求的一HTTP處理應用程式,以及用於處理安 全連接的一HTTP處理應用程式。該HTTP處理應用程式可 以一安全方式初始化與一外部應用程式的通訊。 伺服器裝置200也可包括用於與外部裝置進行通訊的 輸入/輸出介面224,例如一滑鼠、鍵盤、掃描器 '或第2圖 20中未顯示的其他輸入裝置。類似地,伺服器裝置200可進一 包括如CD_R〇M/D VD-ROM光碟機226及硬碟機22 8此類的 額外大容量儲存設備。硬碟機228可被伺服器裝置200用於 儲存除了其他資料外,還有應用程式、資料庫以及其類似 者0 16 200806036 如上述所描述的大容量記憶體說明了另一類型的電腦 可讀媒體、即電腦儲存媒體。電腦儲存媒體可包括:在用 於儲存資訊(例如電腦可讀指令、資料結構、程式模組或其 他資料)的任何方法或技術内實現的非永久性、永久性、可 5移除、及不可移除媒體。電腦儲存媒體之例子包括:RAM、 ROM、EEPROM、快閃記憶體或其他記憶體技術、 CD-ROM、數位視頻光碟(DVD)或其他光學儲存裝置、磁 盒、磁帶、磁碟儲存器或其他磁性儲存裝置,或者被用以 儲存所期望資訊之任何其他媒介,且可由一計算裝置存取。 β亥大谷里§己憶體也儲存程式碼及資料。一或多個應用 程式250被載入大容量記憶體,且在作業系統22〇上執行。 應用程式之例子包括··電子郵件程式、排程器、日暦、轉 碼器、資料庫程式、文書處理程式、電子資料表程式等。 大容量儲存器可進一步包括如選擇性加密元件(SEC)254此 15 類的應用程式。 SEC 254可被配置以接收未加密内容,且部分基於一選 擇準則、選擇性地加密該内容之至少一部分。在一實施例 中,SEC 254提供一被選擇性加密内容串流。在一實施例 中,SEC 254可使用與第6圖之程序600實質上類似的一程 20 序,以執行其等動作中的至少一些。在一實施例中,該被 選擇性加密内容串流是一移動圖像專家組(MPEG)内容串 流,例如一傳輸串流。 簡而言之,Μ P E G是用於數位廣播内容的一編碼及壓縮 標準。MPEG提供用於視訊廣播内容之電視品質傳輸的壓縮 17 200806036 支援。而且,MPEG提供壓縮音訊、控制,甚至是使用者廣 播内容。MPEG-2標準之一實施例在IS〇/IEc 13818_7(在國 際標準組織(ISO)内可獲得)内被描述,其在此處以參照方式 被併入本文。 5 MPEG内容串流包括封包化初級串流(PES),該封包化 初級串流(PES) —般包括整數個初級串流(ES)存取單元之固 定(或可變大小)區塊或圖框。一ES —般是一MPEG内容串流 之一基礎元件,且包括數位控制資料、數位音訊、數位視 訊以及其他數位内容(同步或非同步)。實質上參照相同時間 10 基準的一組緊密耦合PES封包包含一 MPEG程式串流(PS)。 每個PES封包也可被分解為被稱為MPEG傳輸串流(丁s)之固 疋大小的傳輸封包’遠MPEG傳輸串流形成了組合一或多個 内容串流的一通用方法,可能包括獨立時間基準。而且, MPEG圖框包括圖框内(I-圖框)、向前預測圖框(p-圖框)以及 15 雙向預測圖框(B-圖框)。 SEC 254可利用各種加密技術中的其中任一以選擇性 地加密該内容串流之至少一部分,該等加密技術包括下列 但不限於下列:先進加密標準(AES)、RSA Labs Inc.的 (“RSA’s”)RC6、IBM 的 MARS、TwoFish、Serpent、 2〇 CAST-256、國際資料加密演算法(IDEA)、資料加密標準 (DES)、三倍DES(Triple DES)、DES-EDE2、DES-EDE3、 DESX、DES-XEX3、RC2、RC5、Blowfish、Diamon2、TEA、 SAFER、3-WAY、GOST、SHARK、CAST-128、Square、 Skipjack、Panama、ARC4、SEAL、WAKE、Sapphire II、 18 200806036 5 BlumBlumShub、RSA、DSA、ElGamal、Nyberg-Rueppel (NR)、BlumGoldwasser、Rabin、Rabin-Williams (RW)、LUC、 LUCELG、ECDSA、ECNR、ECIES、ECDHC、ECMQVC, 及/或任何其他加密演算法。而且SEC 254可即時(on-the-fly) 執行此加密。 • 10 除此之外,SEC 254可利用一加密技術選擇性地加密該 内容串流之一部分,以及利用一不同加密技術加密該内容 串流之另一部分。SEC254可進一步對該被選擇性加密内容 串流之不同部分使用不同的内容加密金鑰。 在一實施例中,SEC 254可使用一金鑰旋轉機制,其中 成專加密金論可隨者時間在不同金錄之間旋轉。例如,在 一實施例中,SEC 254可使用兩加密金鑰(基於一偶或一奇 15 • 擾亂控制位元)。在一實施例中,SEC 254可選擇性地修改 一傳輸封包標頭以表示該擾亂控制位元是偶或奇數。接 著SEC 254可使用一金输以選擇性加密該内容串流之至少 一部分,且繼而在其他時刻切換該擾亂控制位元,以指示 20 一不同的加密金鑰正被使用。在_實施例中,SEc 254可隨 機地在金錄之間切換或旋轉。在另—實施例中,SEC 254 可基於-預定週期的時間、事件或其類似者在金输之間旋 轉。因此,在-實施例中,兩加密金鑰可被使用;該等金 餘中的一者可被用於一目前加宓 別加途週期,且另一金鑰被用於 該被選擇性加密内容串流⑽下—加密週期。 參看第4圖,第4圖說明τ^ 了 ·、、、員不擾亂控制位元的一傳輸 封包的一實施例。如所示,值鉍 專輪封包4〇〇A包括有效負載402 19 200806036 及標頭404。一般而言,有效負載4〇2可包括大約184位元組 的資料,例如視訊内容、音訊内容、特技播放資料或其類 似者。然而,本發明不限於此等值。標頭404可是一四位元 組(32位元)標頭,該四位元組標頭可包括各種欄位(包栝同 5步位元組、指示一有效負載如何可被處理的旗標位元、指 示一封包屬於哪一串流的一PID、可適性欄位控制位元、連 續位元以及擾亂控制位元4〇6)。如進一步所示,藉由傳輸 封包400B及400C、藉由改變擾亂控制位元406,本發明玎 才9示有效負載疋否利用一偶加密金输(400B)、一奇加密 10金鑰(400Q被加密,或未被加密(4〇〇A)。 SEC 254可在一授權控制訊息(ECM)内提供内容金鑰 以及程式屬性資訊、權利及授權以存取該内容或其類似 者。簡而言之,該ECM —般是包括用以決定一控制字 (CW)(用於解密該内容,也被稱為内容金錄)的資訊之/封 15包。一般而言,該串流化内容之一部分利用該CW被選擇性 加密。該CW可利用一服務金鑰被加密且在該ECM訊息内被 提供。然後’該服務金鑰可利用可被指定給一使用者的〆 加密金鑰被加密,且在一訊息圖框、封包或其類似者之内 被發送。例如,在一實施例中,該服務金錄可在一授權管 20理訊息(emm)内被發送。在一實施例中,該EMM也可包括 與一使用者有關的如訂閱資訊此類的額外資訊,或其類似者。 在一實施例中,該等ECM可被插入該被選擇性加密内 谷串流,使得其等的傳輸可偏移負半個加密週期。而且, ECM可基於每秒一預定數目之次數(基於一pcR)被插入。例 20 200806036 如,在一實施例中,該等ECM可在每秒大約5-25次之間被 插入0 然而,本發明不限於此,且其他頻率也可被使用。SEC 254可進一步將一ECM插入在每個圖框内(i_圖框)標頭、向 5 前預測圖框(P-圖框)標頭或甚至是雙向預測圖框(B-圖框) 標頭之後的至少一封包。在任何情況下,SEC 254被配置以 能夠實質上在每個適當加密週期之前發送該等ECM,使得 用於該被選擇性加密内容的加密金餘可被使用。 SEC 254可部分基於一或多個選擇準則,以選擇性地加 1〇密内容串流之各種部分。此等選擇準則可基於一條件、事 件或其類拟者被動態地修改。例如,在一實施例中,若判 疋舄採用增加的安全性,貝彳SEC 254可使用以下的選擇準 則··可增加一加密金鑰之強度的選擇準則、較頻繁地旋轉 金鑰的選擇準則、增加被選擇性加密部分之數目的選擇準 15則或其類似者。 該#選擇準則也可是(至少部分)基於該内容串流之一 部分的一類型。因此’例如,該等選擇準則可表示:選擇 陡加雄、疋在一傳輸封包階層上發生。該等選擇準則可進一 步表示該内容串流之某些部分可不被加密,或者保持清 20晰’該等部分包括(例如):包含PES標頭的封包,包括特技 播放資料(例如,圖像開始資料、G〇p開始、序列開始、 相結束或其類似者)的視訊封包等。在—實施例中,該 等選擇準則可表示:pAT、獅及/或PMT被保持清峨加 密)。在另-實施例中,該等選擇準則可表示:視訊及/或音 21 200806036 訊封包需被加密、隨機被加密、基於一條件被選擇性加密, 或其類似者。 在另一實施例中,該等選擇準則可表示··加密被選擇 地應用於視訊初級串流(ES)、音訊ES、數位資料ES之至少 5 一部分,以及任何組合,及/或視訊、音訊、資料初級串流 之任何部分。該等選擇準則可進一步包括:選擇性地加密 一I-圖框、P-圖框、B-圖框之至少一部分,以及P、B及I圖 框之任何組合,同時使另一部分保持清晰,或者其類似者。 第5圖可被用以說明依據本發明選擇性加密一内容串 10 流之一例子。如圖所示的是未加密的内容串流500A以及被 選擇性加密的内容串流500B。未加密內容串流500A包括(在 其他元件之間)PAT/PMT標頭502、PES標頭506、特技播放 資料508及520、音訊資料512及516以及視訊資料514封包。 如圖中所描述的是ECM 510,該ECM 510已被插入被選擇性 15 加密内容串流500B。被選擇性加密内容串流500B意指說明 在應用一組可能的選擇準則之後的未加密内容串流500A之 一實施例。 當使用以上所識別的選擇準則中的至少一些時,被選 擇性加密内容串流500B說明了 PAT/PMT 502保持不被加 20 密,PES標頭506以及特技播放資料508也保持不被加密。除 此之外,音訊資料及/或視訊資料封包中的至少一些可被加 密。因此,如所示’音訊資料512封包保持未被加密,而音 訊資料518及視訊資料515被加密。應該清楚的是,第5圖僅 僅是一例子,且一内容串流之其他及/或不同元件可被加 22 200806036 密,或者基於被使用的選擇準則而保持不被加密。 在另一實施例中,本發明可修改該PMT以包括各種加 密資訊。簡而言之,該PMT可包括一内容串流内的封包之 程式元件識別符,例如音訊元件、視訊元件、輔助(aux)資 5 料、程式時脈參考,以及其類似者。一PMT也可包括關於 一ECM訊息的加密資訊。例如,在一實施例中,該pmt可 * 選擇性地被修改以包括條件存取(CA)資訊。在一實施例Communicate with the Internet, or some other communication network (such as network 105 in Figure 1) for various communication protocols including the TCP/IP 10 protocol. The network interface unit 21 is sometimes referred to as a transceiver, a transceiver, a network interface card (NIC), and the like. Server device 200 may also include an SMTP processing application for transmitting and receiving email. The server device 2 can also include an HTTP processing application for receiving and processing HTTP requests, and an HTTP processing application for handling secure connections. The HTTP processing application can initiate communication with an external application in a secure manner. The server device 200 can also include an input/output interface 224 for communicating with external devices, such as a mouse, keyboard, scanner, or other input device not shown in FIG. Similarly, the server device 200 can further include additional mass storage devices such as a CD_R〇M/D VD-ROM disc drive 226 and a hard drive 22-8. The hard disk drive 228 can be used by the server device 200 to store, among other things, applications, databases, and the like. 0 16 200806036 The large-capacity memory as described above illustrates another type of computer readable. Media, ie computer storage media. Computer storage media may include non-permanent, permanent, removable, and non-removable methods implemented in any method or technology for storing information (eg, computer readable instructions, data structures, program modules, or other materials). Remove the media. Examples of computer storage media include: RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital video disc (DVD) or other optical storage device, magnetic box, magnetic tape, disk storage or other A magnetic storage device, or any other medium used to store the desired information, and accessed by a computing device.亥Hidden Valley § Remembrance also stores code and information. One or more applications 250 are loaded into the mass storage and executed on the operating system 22A. Examples of applications include e-mail programs, schedulers, calendars, transcoders, database programs, word processing programs, spreadsheet programs, and more. The mass storage device may further include an application such as a selective encryption element (SEC) 254. The SEC 254 can be configured to receive unencrypted content and selectively encrypt at least a portion of the content based in part on a selection criterion. In an embodiment, SEC 254 provides a stream of selectively encrypted content. In an embodiment, SEC 254 may use a substantially similar sequence to program 600 of Figure 6 to perform at least some of its actions. In one embodiment, the selectively encrypted content stream is a Moving Picture Experts Group (MPEG) content stream, such as a transport stream. In short, Μ P E G is a coding and compression standard for digital broadcast content. MPEG provides compression for TV quality transmission of video broadcast content 17 200806036 Support. Moreover, MPEG provides compressed audio, control, and even user-wide content. One embodiment of the MPEG-2 standard is described in IS〇/IEc 13818_7 (available within the International Standards Organization (ISO)), which is incorporated herein by reference. 5 MPEG content stream includes a packetized primary stream (PES), which typically includes fixed (or variable size) blocks or maps of an integer number of primary stream (ES) access units. frame. An ES is generally a basic component of an MPEG content stream and includes digital control data, digital audio, digital video, and other digital content (synchronous or asynchronous). A set of tightly coupled PES packets that substantially refer to the same time 10 reference contains an MPEG program stream (PS). Each PES packet can also be decomposed into a fixed-size transport packet called an MPEG transport stream (a MPEG transport stream). A far MPEG transport stream forms a common method of combining one or more content streams, which may include Independent time base. Moreover, the MPEG frame includes an intraframe (I-frame), a forward prediction frame (p-frame), and a 15-way prediction frame (B-frame). The SEC 254 can utilize at least a portion of various encryption techniques to selectively encrypt at least a portion of the content stream, including but not limited to the following: Advanced Encryption Standard (AES), RSA Labs Inc. (" RSA's") RC6, IBM's MARS, TwoFish, Serpent, 2〇CAST-256, International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES), Triple DES, DES-EDE2, DES-EDE3 , DESX, DES-XEX3, RC2, RC5, Blowfish, Diamon2, TEA, SAFER, 3-WAY, GOST, SHARK, CAST-128, Square, Skipjack, Panama, ARC4, SEAL, WAKE, Sapphire II, 18 200806036 5 BlumBlumShub , RSA, DSA, ElGamal, Nyberg-Rueppel (NR), BlumGoldwasser, Rabin, Rabin-Williams (RW), LUC, LUCELG, ECDSA, ECNR, ECIES, ECDHC, ECMQVC, and/or any other encryption algorithm. And the SEC 254 can perform this encryption on-the-fly. • In addition, the SEC 254 can selectively encrypt a portion of the content stream using an encryption technique and encrypt another portion of the content stream using a different encryption technique. The SEC 254 may further use different content encryption keys for different portions of the selectively encrypted content stream. In an embodiment, the SEC 254 may use a key rotation mechanism in which the special encryption theory may rotate between different records at any time. For example, in one embodiment, the SEC 254 can use two encryption keys (based on an even or an odd 15 • scrambling control bit). In an embodiment, SEC 254 may selectively modify a transport packet header to indicate that the scrambling control bit is even or odd. A SEC 254 can then use a gold input to selectively encrypt at least a portion of the content stream, and then switch the scrambling control bit at other times to indicate that a different encryption key is being used. In an embodiment, the SEc 254 can be switched or rotated randomly between the gold records. In another embodiment, SEC 254 may rotate between gold inputs based on a predetermined period of time, event, or the like. Thus, in an embodiment, two encryption keys can be used; one of the gold balances can be used for a current add-on add-on cycle, and another key is used for the selectively encrypted Content stream (10) - encryption period. Referring to Fig. 4, Fig. 4 illustrates an embodiment of a transmission packet in which the controller does not disturb the control bit. As shown, the value 铋 special wheel packet 4A includes the payload 402 19 200806036 and the header 404. In general, payload 4〇2 may include approximately 184 bytes of material, such as video content, audio content, trick play material, or the like. However, the invention is not limited to this equivalent. The header 404 can be a four-byte (32-bit) header, which can include various fields (including the same 5-step byte, indicating how a payload can be processed) A bit, a PID indicating which stream a packet belongs to, a suitability field control bit, a contiguous bit, and a scrambling control bit 4〇6). As further shown, by transmitting the packets 400B and 400C, by changing the scrambling control bit 406, the present invention shows whether the payload uses an even encryption gold (400B), an odd encryption 10 key (400Q). Encrypted, or not encrypted (4〇〇A) The SEC 254 may provide content keys and program attribute information, rights and authorizations in an Authorization Control Message (ECM) to access the content or the like. In other words, the ECM generally includes 15 packets of information to determine a control word (CW) (used to decrypt the content, also referred to as content record). In general, the streaming content A portion of the CW is selectively encrypted using the CW. The CW can be encrypted with a service key and provided within the ECM message. The service key can then be encrypted using a 〆 encryption key that can be assigned to a user. Encrypted and transmitted within a message frame, packet, or the like. For example, in one embodiment, the service record can be sent within an authorization message (emm). In an embodiment The EMM may also include a user related information such as subscription information. Additional information, or the like. In an embodiment, the ECMs may be inserted into the selectively encrypted inner valley stream such that transmissions thereof may be offset by a negative half encryption period. Moreover, the ECM may be based on each The second is a predetermined number of times (based on a pcR) is inserted. Example 20 200806036 For example, in an embodiment, the ECMs may be inserted between about 5-25 times per second. However, the present invention is not limited thereto. And other frequencies can be used. SEC 254 can further insert an ECM into each frame (i_frame) header, to the 5 pre-predictive frame (P-frame) header or even to bi-directional prediction. Frame (B-frame) at least one packet after the header. In any case, the SEC 254 is configured to be able to transmit the ECMs substantially for each of the appropriate encryption periods for the selectively encrypted content. The SEC 254 may be used in part based on one or more selection criteria to selectively add portions of the cryptographic content stream. These selection criteria may be based on a condition, event, or its like. Dynamically modified. For example, in an embodiment, if舄With increased security, Belle SEC 254 can use the following selection criteria: a selection criterion that increases the strength of an encryption key, a selection criterion for rotating the key more frequently, and an increase in the number of selectively encrypted portions. The criterion 15 is selected or the like. The # selection criterion may also be (at least in part) a type based on a portion of the content stream. Thus, for example, the selection criteria may indicate that the selection is steep, the transmission is in a transmission. The packet hierarchy occurs. The selection criteria may further indicate that portions of the content stream may not be encrypted, or remain clear. The portions include, for example, a packet containing a PES header, including trick play data ( For example, video packets such as image start data, G〇p start, sequence start, phase end, or the like). In an embodiment, the selection criteria may indicate that pAT, lion, and/or PMT are kept clean and encrypted. In another embodiment, the selection criteria may indicate: video and/or tone 21 200806036 The packet needs to be encrypted, randomly encrypted, selectively encrypted based on a condition, or the like. In another embodiment, the selection criteria may indicate that the encryption is selectively applied to at least a portion of the video primary stream (ES), the audio ES, the digital data ES, and any combination, and/or video, audio. , any part of the primary stream of data. The selection criteria can further include: selectively encrypting an I-frame, a P-frame, at least a portion of the B-frame, and any combination of P, B, and I frames while leaving the other portion clear, Or its similar. Figure 5 can be used to illustrate an example of selectively encrypting a stream of content streams in accordance with the present invention. Shown are unencrypted content stream 500A and selectively encrypted content stream 500B. The unencrypted content stream 500A includes (between other components) a PAT/PMT header 502, a PES header 506, trick play data 508 and 520, audio data 512 and 516, and a video material 514 packet. Described in the figure is an ECM 510 that has been inserted to selectively encrypt the content stream 500B. The selectively encrypted content stream 500B is meant to illustrate one embodiment of the unencrypted content stream 500A after applying a set of possible selection criteria. When using at least some of the selection criteria identified above, the selectively encrypted content stream 500B illustrates that the PAT/PMT 502 remains unencrypted, and the PES header 506 and trick play material 508 remain unencrypted. In addition, at least some of the audio data and/or video data packets may be encrypted. Thus, as shown, the 'audio material 512 packet remains unencrypted, and the audio material 518 and video material 515 are encrypted. It should be clear that Figure 5 is only an example, and that other and/or different elements of a content stream may be added 22 200806036 or remain unencrypted based on the selection criteria used. In another embodiment, the present invention can modify the PMT to include various encryption information. In short, the PMT can include a program component identifier for a packet within a content stream, such as an audio component, a video component, an auxiliary (aux) resource, a program clock reference, and the like. A PMT may also include encrypted information about an ECM message. For example, in an embodiment, the pmt can be selectively modified to include conditional access (CA) information. In an embodiment
g 中’該CA資訊可指定與一證書授權、一内容提供者、一 v〇D 選擇性加密伺服器或其類似者相關的一系統識別符。在另 10 一實施例中,該PMT也可被修改以包括與該ECM串流有關 的一PiD。在另一實施例中;該PMT也可被修改以包括一串 流描述符,例如在該ECM串流是一pES串流的情況下(例 如,一串流類型PES隱私),或其類似者。 說明性客戶 15 第3圖顯示了依據本發明之一實施例的一計算裝置之 • _實_。客戶裝置綱可包括比所示的該等元件更多的元 ^ # °然而’所*_等元件足觸露實踐本發明的-說明 f生貝知例。例如,客戶裝置3〇〇可表示第1圖之客戶裝置咖。 客戶裝置300包括處理單元312、視訊顯示轉接器314、 2〇以及大奋里錢體,每個裝置都透過匯流排322彼此進行 該大各里C憶體一般包括RAM 316、ROM 332,及 一或多個水久大容量儲存裝置(例如,硬碟機328、磁帶機、 ,碟機及/或軟碟機)。該大容量記憶體儲存用於控制客戶 裝置3〇0之運作的作業系統32〇。任何通用作業系統可被使 23 200806036 用。基本輸入/輸出系統(“BIOS”)318也被提供用於控制客戶 裝置3⑽之低階運作。如第3圖所描述,客戶裝置3〇〇也可透 過網路介面單元310(被構造為用於包括TCP/IP協定的各種 通訊協定)與網際網路、或一些其他通訊網路(例如第1圖内 5的網路105)進行通訊。網路介面單元310有時被稱為收發 器、收發裝置或網路介面卡(NIC)。 以上所1¾述的大谷1 §己憶體說明了另一種電腦可讀媒 體,即電知儲存媒體。電腦儲存媒體可包括··在用於儲存 資δίΐ (例如電細可讀指令、資料結構、程式楹纟a赤直杳 10的任何方法或技術内實現的非永久性、永久性、可移除、 及不可移除媒體。電腦儲存媒體之例子包括·· p、AM、rqm、 EEPROM、快閃記憶體或其他記憶體技術、CD_R〇M、數 位視頻光碟(DVD)或其他光學儲存裝置、磁盒、磁帶、磁 碟儲存器或其他磁儲存裝置,或者被用以儲存所期望資訊 15 之任何其他媒體,且可由一計算裝置存取。 客戶裝置300也可包括用於傳送及接收電子郵件的一 SMTP處理應用程式、用於接收且處理Ηττρ請求的_HTTp 處理應用程式,以及用於處理安全連接的11711?處理應用程 式。該HTTP處理應用程式可以一安全方式初始化與一外部 20 應用程式的通訊。 客戶裝置300也可包括用於與外部裝置進行通訊的輸 入/輸出介面324,例如一手持遠端控制裝置、滑鼠、鍵盤、 掃描器、或第3圖中未顯示的其他輸入裝置。類似地,客戶 裝置300可進一步包括如CD_R〇M/D VD_R〇M光碟機3 %及 24 200806036 硬碟機328此類的額外大容量儲存設備。硬碟機328可被用 於儲存除了別的資料以外,還有應用程式、資料庫、客戶 裝置組恶資訊、政策及其類似者。 該大容量記憶體也儲存程式碼及資料。一或多個應用 5程式350被載入大容量記憶體内,且在一作業系統320上執 行。應用程式之例子可包括下列但不限於下列:轉碼器、 排程器、日曆、資料庫程式、文書處理程式、Ηττρ程式、 音訊播放器、視訊播放器、v〇D播放器、解碼器、解密器、 PPV播放器、一STB之介面程式、一電視之介面程式、視訊 10照相機等。大容量儲存器可進一步包括如客戶選擇性加密 元件(CSEC)352此類的應用程式,其可自另一計算裝置(例 如,伺服器102、第1圖之内容提供伺服器1〇1或甚至另一網 路裝置、可攜式儲存裝置或其類似者)被下載。在至少一實 施例中,CSEC 352可被配置以執行與第2圖之SEC 254實質 15上類似的動作。也就是說,CSEC 352可接收未加密内容(保 持清晰的内容),且選擇性加密該内容之至少一部分。在一 實施例中’CSEC 352可使用與以下所描述的程序6〇〇類似的 一程序,以選擇性地加密客戶裝置300内的該内容之至少一 部分。 20 一般化操作 現在關於第6圖描述本發明之一些層面的操作。第6圖 說明了-邏輯流程圖,-般顯示依據本發明以選擇性加密 -傳輸串流之部分的-程序之-實施例。第6圖之程序刪 可被實現(例如)在第1圖之SES 1〇2内,以及/或第3圖之 25 200806036 CSEC 352内。 在一開始方塊之後,程序_在—未加密内容串流被接 收的方塊602内開始。在-實施例中,議未加密内容串流自 (例如)-内容提供者、m儲存裝置或其類似者被接 5收。然而,本發明不限於此,且該未加密内容串流也可在 一客戶裝置内被接收,由於解密用於播放的一内容串流, 或其類似者。 接著處理進行到決定一或多個加密選擇準則的方塊 604。此等選擇準則可包括以上所描述的該箄撰渥進目彳由沾 10至少一些,包括使特技播放資料保持清晰(未被加密)、使 PES標頭封包保持清晰、或其類似者。然後處理進行到決策 方塊606,以部分基於一或多個已決定的選擇準則,判定該 未加密内容串流之一目前部分是否需被加密。 有關是否加密該内容串流之一部分的判定可(在一些 15情況下)導致緩衝儲存〇此611叩)該内容串流中的至少一 些。例如,在内容跨越多於一個封包的情況下,多個封包 可被緩衝儲存以判定是否被加密。舉例而言,如第5圖所 示,特技播放資料520被顯示跨越多個封包。因此,在一實 施例中,為了判定是否加密,多個封包可被檢查。在任何 2〇 一丨月況下,右該目前部分(例如,一或多個封包)需被選擇性 加密,則處理進行到608 ;否則,處理進行到方塊61〇。在 方塊610内’ #亥目前部分保持不被加密,且處理繼續到方塊61〗。 在方塊608内,該内容串流之該目前部分被選擇性加 密。該加密可使用各種加密技術,包括加密金鑰之旋轉、 26 200806036 改變加密之一強度,或其類似者,如以上所描述。而且, 如以上所描述,在一實施例中,該選擇性加密可導致選擇 性加遂、該内谷串流内的多於一個封包。選擇性加密可進一 步包括:修改一標頭内的一擾亂控制位元,以指示不同的 5加密金鑰被使用、加密被執行或其類似者。然後,處理繼 續到方塊612。 在方塊612内,部分基於上述討論,一或多個ECM可被 插入該被選擇性加密的内容串流内。接著處理進行到決策 方塊614 ’此處有關該内容串流之目前部分是否包括一ρΜΤ 10標頭的判定被作出。若包括,則處理分支到方塊618 ;否則, 處理繼續到方塊616。 在方塊618内,邊PMT標頭可藉由插入條件存取資訊及 /或額外資訊而被修改。然後,處理進行到方塊616。 然後,程序600進行到方塊616,此處内容串流之被選 15擇性加密的部分可被轉發(forwarded),從而在一實施例中 致能即時加密。在一實施例中,該被選擇性加密的内容串 流可被轉發給一客戶裝置,例如第1圖之客戶裝置1 。在 另一實施例中,該被選擇性加密内容串流可被轉發給另一 程序、一儲存裝置或其類似者。 20 處理繼續到決策方塊62〇,此處有關是否有該内容串流 之額外部分需被評估的判定被作出。若是,則處理進行到 方塊622,此處該内容_流之下一部分被接收,且處理迴圈 回到決策步驟606以應用該(等)選擇加密選擇準則。然而, 若在決策方塊620内,該内容串流中不再有任何部分需為選 27 200806036 擇f生力仏而σ平估’則程序_返回到一呼叫矛呈序以執行其他 動作。 將明白的是,該流程說明之每個方塊以及該流輕說明 内的方塊之組合可由電腦程式指令實施。此等程式指令可 5被提供給-處理器以產生一機器,使得在該處理器上執行 “ _等指令產生用以實現在該(等)流程方塊_指定的^ • 狀裝置。該等電腦程式指令可由-處理器執行以使一連 馨串的操作步驟由該處理器執行,從而產生_電腦實施種 序,使付在該處理器上執行的指令提供用於實現在該(等) 10流程方塊内被指定的動作之步驟。 因此,該等流程說明之方塊支援用以執行該等被指定 動作的裝置之組合’用以執行該等被指定動作之步驟的= 合,以及用以執行該等被指定動作之程式指令裝置。也應 明白的是,該流程說明中的每個方塊,以及該流程說明 15的方塊之組合,可由特定目的之基於硬體系統實現,其執 •=指定動作或步驟’或者特定目的之硬體及電腦指 以上說明書、例子及資料提供該本發明之组成的製生 及使用的完整描述。因為在沒有背離本發明之精神及範= 2〇下,本發明之許多實施例可被作出,故本發明屬於在 後附力Π的申請專利範圍内。 【圖式簡單說明】The CA information in g may specify a system identifier associated with a certificate authority, a content provider, a v〇D selective encryption server, or the like. In another eleventh embodiment, the PMT can also be modified to include a PiD associated with the ECM stream. In another embodiment; the PMT can also be modified to include a stream descriptor, such as where the ECM stream is a pES stream (eg, a stream type PES privacy), or the like . Illustrative Client 15 Figure 3 shows a _real_ of a computing device in accordance with an embodiment of the present invention. The client device can include more elements than the ones shown. However, the components are fully exposed to practice the invention. For example, the client device 3 can represent the client device of FIG. The client device 300 includes a processing unit 312, video display adapters 314, 2, and a large body, each of which is configured to communicate with each other through the bus bar 322. The memory device generally includes a RAM 316, a ROM 332, and One or more water-capacity storage devices (eg, hard disk drive 328, tape drive, disk drive, and/or floppy disk drive). The mass storage device stores an operating system 32 for controlling the operation of the client device 〇0. Any general operating system can be used by 23 200806036. A basic input/output system ("BIOS") 318 is also provided for controlling the low level operation of client device 3 (10). As depicted in Figure 3, the client device 3 can also communicate with the Internet, or some other communication network (e.g., the first interface) through the network interface unit 310 (which is configured for various communication protocols including TCP/IP protocols). The network 105 of Figure 5 communicates. Network interface unit 310 is sometimes referred to as a transceiver, transceiver, or network interface card (NIC). The Otani 1 § Remembrance described above illustrates another computer readable medium, namely a known storage medium. The computer storage medium may include non-permanent, permanent, removable in any method or technique for storing δίΐ (eg, a fine-readable instruction, a data structure, a program, or a program). And non-removable media. Examples of computer storage media include · p, AM, rqm, EEPROM, flash memory or other memory technology, CD_R〇M, digital video disc (DVD) or other optical storage device, magnetic A cartridge, magnetic tape, disk storage or other magnetic storage device, or any other medium used to store the desired information 15 and accessible by a computing device. The client device 300 may also include for transmitting and receiving electronic mail. An SMTP processing application, a _HTTp processing application for receiving and processing Ηττρ requests, and a 11711 processing application for handling secure connections. The HTTP processing application can be initialized in a secure manner with an external 20 application. The client device 300 can also include an input/output interface 324 for communicating with external devices, such as a handheld remote control device, a mouse, A keyboard, a scanner, or other input device not shown in Fig. 3. Similarly, the client device 300 may further include additional such as CD_R〇M/D VD_R〇M disc player 3% and 24 200806036 hard disk drive 328. A mass storage device. The hard disk drive 328 can be used to store, among other things, applications, databases, client device information, policies, and the like. The large-capacity memory also stores code and Data. One or more application 5 programs 350 are loaded into the mass memory and executed on an operating system 320. Examples of applications may include the following but are not limited to the following: transcoders, schedulers, calendars, Database program, word processing program, τττρ program, audio player, video player, v〇D player, decoder, decryptor, PPV player, an STB interface program, a TV interface program, video 10 camera The mass storage device may further include an application such as Customer Selective Cryptographic Element (CSEC) 352, which may be from another computing device (eg, server 102, Figure 1) For server 1〇1 or even another network device, portable storage device or the like) is downloaded. In at least one embodiment, CSEC 352 can be configured to perform SEC 254 with Figure 2 substantially 15 A similar action is taken. That is, the CSEC 352 can receive unencrypted content (clear content) and selectively encrypt at least a portion of the content. In an embodiment, the 'CSEC 352 can use the program 6 described below. A similar procedure to selectively encrypt at least a portion of the content within client device 300. 20 Generalized Operations The operation of some aspects of the present invention is now described with respect to FIG. Figure 6 illustrates a logic flow diagram that generally shows an embodiment of a program that selectively encrypts - transmits a portion of a stream in accordance with the present invention. The program deletion of Fig. 6 can be implemented (for example) in SES 1〇2 of Fig. 1 and/or 25 200806036 CSEC 352 of Fig. 3. After the start block, the program_ begins in block 602 where the unencrypted content stream is received. In an embodiment, the unencrypted content stream is received from, for example, a content provider, an m storage device, or the like. However, the invention is not limited thereto, and the unencrypted content stream may also be received within a client device due to decrypting a stream of content for playback, or the like. Processing then proceeds to block 604 which determines one or more encryption selection criteria. Such selection criteria may include at least some of the above described simplifications, including keeping the trick play material clear (not encrypted), keeping the PES header packet clear, or the like. Processing then proceeds to decision block 606 to determine whether the current portion of one of the unencrypted content streams needs to be encrypted based in part on one or more of the determined selection criteria. A determination as to whether to encrypt a portion of the content stream may (in some 15 cases) cause the buffer to store at least some of the content stream. For example, where content spans more than one packet, multiple packets may be buffered to determine if they are encrypted. For example, as shown in Figure 5, trick play material 520 is displayed spanning multiple packets. Thus, in one embodiment, multiple packets may be examined in order to determine whether to encrypt. In any case of 2 months, the current portion (e.g., one or more packets) needs to be selectively encrypted, and processing proceeds to 608; otherwise, processing proceeds to block 61. Within block 610, the current portion remains unencrypted and processing continues to block 61. In block 608, the current portion of the content stream is selectively encrypted. The encryption can use various encryption techniques, including the rotation of the encryption key, 26 200806036, changing one of the strengths of encryption, or the like, as described above. Moreover, as described above, in an embodiment, the selective encryption may result in selective addition, more than one packet within the inner valley stream. Selective encryption may further include modifying a scrambling control bit within a header to indicate that a different 5 encryption key is used, encryption is performed, or the like. Processing then continues to block 612. Within block 612, based in part on the above discussion, one or more ECMs can be inserted into the selectively encrypted content stream. Processing then proceeds to decision block 614' where a determination is made as to whether the current portion of the content stream includes a ρ ΜΤ 10 header. If included, the process branches to block 618; otherwise, processing continues to block 616. In block 618, the edge PMT header can be modified by inserting conditional access information and/or additional information. Processing then proceeds to block 616. Program 600 then proceeds to block 616 where the portion of the content stream that is selectively encrypted can be forwarded, thereby enabling instant encryption in one embodiment. In one embodiment, the selectively encrypted content stream can be forwarded to a client device, such as client device 1 of Figure 1. In another embodiment, the selectively encrypted content stream can be forwarded to another program, a storage device, or the like. 20 Processing continues to decision block 62, where a determination is made as to whether there is an additional portion of the content stream to be evaluated. If so, then processing proceeds to block 622 where a portion of the content_stream is received and the processing loops back to decision step 606 to apply the (etc.) selection encryption selection criteria. However, if, in decision block 620, there is no longer any portion of the content stream to be selected, then the program _ returns to a call spear sequence to perform other actions. It will be understood that each block of the flow description and combinations of blocks within the flow description can be implemented by computer program instructions. The program instructions 5 can be provided to the processor to generate a machine such that "the instructions are generated on the processor to implement the device specified in the process block." The program instructions are executable by the processor to cause a series of operational steps to be performed by the processor, thereby generating a computer-implemented sequence for causing instructions executed on the processor to be provided for implementation in the (etc.) 10 process The steps of the specified actions within the blocks. Accordingly, the blocks of the process descriptions support a combination of means for performing the specified actions 'for performing the steps of the specified actions, and for performing the The program instruction device of the specified action, it should also be understood that each block in the flow description, and the combination of the blocks of the flow description 15, can be implemented by a specific purpose hardware-based system, and the specified action is performed. Or the 'or the specific purpose of the hardware and computer refers to the above description, examples and materials to provide a complete description of the composition and use of the composition of the present invention because there is no deviation The spirit and scope = 2〇 invention, many embodiments of the present invention can be made, and therefore the present invention resides in the scope of the appended patent application force of Π.] [Brief Description of the drawings
第1圖顯示了說明用於實踐本發明的一環境之 A 例的一功能方塊圖; & 28 200806036 第2圖顯示了可被包括在實施本發明的一系統内的一 伺服器裝置的一實施例; 第3圖顯示了可被包括在實施本發明的一系統内的一 客戶裝置的一實施例; 5 第4圖說明一般顯示用於加密展示可能的擾亂控制的 一傳輸封包的一實施例的功能圖; 第5圖說明一般顯示一傳輸串流之被選擇性加密部分 的一實施例的功能圖; 第6圖說明一般顯示依據本發明以選擇性加密一傳輸 10 串流之部分的一程序之一實施例的一邏輯流程圖。 【主要元件符號說明】 101…内容提供伺服器1 is a functional block diagram showing an example of an environment for practicing the present invention; & 28 200806036 FIG. 2 shows a server device that can be included in a system embodying the present invention. Embodiments; Figure 3 shows an embodiment of a client device that can be included in a system embodying the present invention; 5 Figure 4 illustrates an implementation of a transport packet that is generally shown for encrypting possible scrambling control. Functional diagram of an example; Figure 5 illustrates a functional diagram generally showing an embodiment of a selectively encrypted portion of a transport stream; Figure 6 illustrates a general display of selectively encrypting a portion of a 10 stream in accordance with the present invention. A logic flow diagram of an embodiment of a program. [Main component symbol description] 101... content providing server
102.. .5.S 105.. .網路 106.300.. .客戶裝置 200.. .伺服器裝置 210,310…網路介面單元 212,312·· ·處理單元 214,314...視訊顯示轉接器102.. .5.S 105.. . Network 106.300.. Client device 200.. Server device 210, 310... Network interface unit 212, 312 · · Processing unit 214, 314... Video display Adapter
216 ^ 316...RAM216 ^ 316...RAM
218,318··-BIOS 220,320…作業系統 222,322…匯流排 224,324…輸入/輸出介面 226,326".CD-ROM/DVD-ROM光碟機 29 200806036 228,328".硬碟機 232,332··.ROM 250,350...應用程式218,318··-BIOS 220,320...Operating system 222,322...Bus line 224,324...Input/output interface 226,326".CD-ROM/DVD-ROM drive 29 200806036 228,328". Machine 232, 332··.ROM 250,350...application
254.. .5.C 352…CSEC 400A,400B,400C···傳輸封包 402.. .有效負載 404.. .標頭 406.. .擾IL控制位元 500A...未加密的内容串流 500B…以選擇性力口密的内容串流 502…PAT/PMT標頭 506.. .PES 標頭 508,520...特技播放資料254.. .5.C 352...CSEC 400A,400B,400C···Transport packet 402.. payload 404.. .header 406.. .Irrigation IL control bit 500A... unencrypted content string Stream 500B... Streaming content 502 with selective force density...PAT/PMT header 506.. .PES header 508,520... Stunt play material
510.. .ECM 512,516,518···音訊資料 514,515···視訊資料 600…程序 603〜622…步驟 30510.. .ECM 512,516,518···Audio Materials 514,515···Video Materials 600...Programs 603~622...Step 30
Claims (1)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US75705506P | 2006-01-06 | 2006-01-06 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TW200806036A true TW200806036A (en) | 2008-01-16 |
Family
ID=44766219
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW96100443A TW200806036A (en) | 2006-01-06 | 2007-01-05 | Selective and persistent application level encryption for video provided to a client |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TW200806036A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109905762A (en) * | 2017-12-08 | 2019-06-18 | 三星电子株式会社 | Image processing device and control method thereof |
-
2007
- 2007-01-05 TW TW96100443A patent/TW200806036A/en unknown
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109905762A (en) * | 2017-12-08 | 2019-06-18 | 三星电子株式会社 | Image processing device and control method thereof |
| CN109905762B (en) * | 2017-12-08 | 2022-08-26 | 三星电子株式会社 | Image processing apparatus and control method thereof |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8526612B2 (en) | Selective and persistent application level encryption for video provided to a client | |
| US9225761B2 (en) | Distributed media-aggregation systems and methods to operate the same | |
| US7231516B1 (en) | Networked digital video recording system with copy protection and random access playback | |
| US9178693B2 (en) | Distributed media-protection systems and methods to operate the same | |
| JP4861258B2 (en) | Method and apparatus for encrypting media programs for later purchase and viewing | |
| CN100555932C (en) | Key insertion method and system for stored encrypted content | |
| US7681244B2 (en) | Packet transmitter apparatus | |
| US8213768B2 (en) | Packet transmitting apparatus | |
| CA2408232C (en) | Method and apparatus for enabling random access to individual pictures in an encrypted video stream | |
| US8532075B2 (en) | Transitioning to secure IP communications for encoding, encapsulating, and encrypting data | |
| US20080015999A1 (en) | Securely ingesting encrypted content into content servers | |
| WO2007010779A1 (en) | Packet transmitter | |
| CN1226359A (en) | Self-adaptive decoding system for processing enciphered and unenciphered video-frequency data | |
| JP2010088121A (en) | Apparatus for processing digital video data | |
| JP2010109996A (en) | Decryption method for processing encrypted video data | |
| TW201436553A (en) | System and method for combining and extracting command and control data | |
| JP6793364B2 (en) | Content decoding device, content decoding method, receiving device and program | |
| TW200806036A (en) | Selective and persistent application level encryption for video provided to a client | |
| GB2599982A (en) | Prioritized content encryption for rapid breach response | |
| CN101444096A (en) | Encryption device, decryption device, license issuing device, and content data generating method | |
| EP1499062B1 (en) | Individual video encryption system and method | |
| JP2005204175A (en) | Digital content encryption apparatus, digital content encryption method, digital content encryption program, and digital content decryption program | |
| JP5326602B2 (en) | Server and content distribution method | |
| Kim et al. | Protection system for MPEG-2 streaming media | |
| AU2004224936A1 (en) | Encryption of MPEG Bitstreams |