(19) United States (12) Patent Application Publication (10) Pub

Total Page:16

File Type:pdf, Size:1020Kb

(19) United States (12) Patent Application Publication (10) Pub US 20080095364Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2008/0095364 A1 Candelore et al. (43) Pub. Date: Apr. 24, 2008 (54) PARTIAL ENCRYPTION (60) Provisional application No. 60/296,673, ?led on Jun. 6, 2001. Provisional application No. 60/304,241, ?led (76) Inventors: Brant L. Candelore, Escondido, CA on Jul. 10, 2001. Provisional application No. 60/304, (US); Robert Allan Unger, El Cajon, 131, ?led on Jul. 10, 2001. Provisional application CA (US); Leo M. PedloW JR., No. 60/343,710, ?led on Oct. 26, 2001. Ramona, CA (US) Publication Classi?cation Correspondence Address: MILLER PATENT SERVICES (51) Int. Cl. 2500 DOCKERY LANE H04N 7/167 (2006.01) RALEIGH, NC 27606 (US) (52) US. Cl. ............................................................ .. 380/212 (21) Appl. No.: 12/001,561 (57) ABSTRACT (22) Filed: Dec. 12, 2007 Related US. Application Data A multiple partial encryption device consistent With certain embodiments has an input for receiving a unencrypted video (60) Continuation of application No. 11/903,809, ?led on signal. An encryption arrangement produces a partially Sep. 25, 2007, Which is a continuation of application multiple encrypted video signal from the unencrypted video No. 11/282,139, ?led on Nov. 18, 2005, noW Pat. No. signal. An output provides the partially multiple encrypted 7,319,753, Which is a division of application No. video signal. This abstract is not to be considered limiting, 10/037,499, ?led on Jan. 2, 2002, noW Pat. No. since other embodiments may deviate from the features 7,151,831. described in this abstract. CABLE SYSTEM 122 [36 HEAD END TELEVISION I 128 / SET-TOP BOX MANUFACTURER - A SYSTEM TELEVISION IN FORMATION CONDITIONAL SET ACCESS CLEAR VIDEO SYSTEM - A CLEAR AUDIO CABLE SYSTEM 40) PROGRAM 136 SPECIFIC / INFORMATION TELEVISION ' \129 SET-TOP BOX CONDITIONAL MANUFACTURER - B ACCESS TELEVISION SYSTEM - A CONDITIONAL SET ACCESS CONDITIONAL SYSTEM - B ACCESS I SYSTEM - B\ 140 j 124 Patent Application Publication Apr. 24, 2008 Sheet 1 0f 16 US 2008/0095364 A1 3 3/ .QIv mm moi“:5E mm Skk- Patent Application Publication Apr. 24, 2008 Sheet 2 0f 16 US 2008/0095364 A1 \wv 31 mm mm? / ow .QEN mm mm? ~5689>1 SE96<- 2596/m- v2.)9E m9] izoEazoo $52Al1 4<zoEQzoo $52A1 Patent Application Publication Apr. 24, 2008 Sheet 3 0f 16 US 2008/0095364 A1 $\ Al (I \ ml /ovw / 8 wow oNN SEEOONEO_n__Own_w J2.0. Patent Application Publication Apr. 24, 2008 Sheet 4 0f 16 US 2008/0095364 A1 NEXT PACKET YES I l 262 PACKET PACKET I ENCRYPTION ENCRYPTION \_ A B FIG. 4 C EA INSERTINTO [264 254\ OUTPUT EB REMAP PID _ STREAM Secondary PID \ STREAM|—->OUTPUT CCCCCCEAEBCCCCC' \ I / \ I I Primary PID Primary PID NEXT PACKET PRIMARY Pl D SECONDARY PACKET? Pl D PACKET? 292 REMAP PID ENCRYPTED? @ .. DECRYPT f 296 288 , 278 NO J, DROP / SEND PACKET TO PAC KET DECODER L FIG. 5 Patent Application Publication Apr. 24, 2008 Sheet 5 0f 16 US 2008/0095364 A1 /own XOmmOPFww d , ovl/ O 0") mm ZO_ww< .OZOOmw/ womlj+ mSE55,/- 5210011O?zOmmw 0mmwrm wwm / Al Patent Application Publication Apr. 24, 2008 Sheet 6 0f 16 US 2008/0095364 A1 NEXT PACKET PACKET?SELECT YES l 358 i 350 f PACKET PACKET ENCRYPTION ENCRYPTION A B FIG. 7 EA 362 J 354 366 \ INSERT INTO f OUTPUT 4 EB REMAP PID STREAM Secondary PID -\ STREAML-—->OUTPUT CCCCCCEAEBCCCCCC Primary PID Primary PID 370 374 NEXT PACKET NO EA PACKET? EB PACKET? 384 I /— DROP \_DECRYPT 380 PACKET ; REMAP PID 388-/ l FIG. 8 EDECODER 4— 378 Patent Application Publication Apr. 24, 2008 Sheet 7 0f 16 US 2008/0095364 A1 vvv mm wmw \ov 0 q. Jomw / , M4040Own=> 5“)8v 4<zo_k_azoo E55m- wmv TI852 Patent Application Publication Apr. 24, 2008 Sheet 8 0f 16 US 2008/0095364 A1 Patent Application Publication Apr. 24, 2008 Sheet 11 0f 16 US 2008/0095364 A1 1 FIG. 13 RECEIVE F FEED 806 l DESCRAMBLE \ 810 SELECT PACKETS FOR 814 "' DUAL ENCRYPTION i DUPLICATE SELECTED ICOO O PACKETS AND REMAP SELECTED PACKETS TO TWO \ NEW PIDS 818 i DUAL ENCRYPT REMAPPED /- PACKETS ACCORDING TO 822 P|D l REMAP CLEAR PACKETS TO '\ SAME PID AS LEGACY 826 ENCRYPTED PACKETS l Patent Application Publication Apr. 24, 2008 Sheet 12 0f 16 US 2008/0095364 A1 85521120202N6|\ \50z_<_>_# > Q6. ,fNS2m\ Ill:69$0085 _>_Om2302.52 0E5.88%B3E@9509 105330050z_mmaoowamwxwi?simoAl A 8.5226aim“; 8985832%9amwtammwknm 0GE1 8m C8\ >803655cm ExomaumEEEow Ewza595._ Patent Application Publication Apr. 24, 2008 Sheet 13 0f 16 US 2008/0095364 A1 @258 ‘Imczzooxo 52¢28628%?N6 \\ > mwooowa09%. EmzE $582203 . E5@9509 3mf$50809 3m2m .\ o8 GE2‘mwtpmwmEnm 4 M396 Patent Application Publication Apr. 24, 2008 Sheet 14 0f 16 US 2008/0095364 A1 @252855521N6\\ $562203 . 3.5;@9509 __ __ __ __ 3m9$0080If3mNS o3// IQ \ 1l|iIrl|I JlI.I|lI mom moimm?mkémoA|_|5665350oi$0085nAlA. GEmmtnmmmtpm.2 86 US 2008/0095364 A1 Apr. 24, 2008 PARTIAL ENCRYPTION that pulls the signal from the air and delivers it to a demodulator, Which in turn provides video to a display and CROSS REFERENCE TO RELATED audio to speakers. In a cable system the modulated channels DOCUMENTS are carried over a cable. There may also be an in-band or [0001] This application is continuation of US. application out-of-band feed of a program guide indicating What pro Ser. No. 11/903,809 ?led Sep. 25, 2007 Which is a continu grams are available and the associated tuning information. ation of application Ser. No. 10/282,139 ?led Nov. 18, 2005 The number of cable channels is ?nite and limited by Which is a division of US. application Ser. No. 10/037,499 equipment/cable bandWidth. Cable distribution systems ?led Jan. 2, 2002 (US. Pat. No. 7,151,831), and further require a signi?cant capital investment and are expensive to claims priority bene?t of US. provisional patent application upgrade. Ser. No. 60/296,673 ?led Jun. 6, 2001 to Candelore, et al. [0005] Much of television content is valuable to its pro entitled “Method for Allowing Multiple CA Providers to ducers, therefore copyright holders Want to control access Interoperate in a Content Delivery System by Sending Video and restrict copies. Examples of typically protected material in the Clear for Some Content, and Dual Carriage of Audio include feature ?lms, sporting events, and adult program and Dual Carriage of Video and Audio for Other Content”, ming. Conditional access (CA) systems are used to control and provisional patent application Ser. No. 60/304,241 ?led availability of programming in content delivery systems Jul. 10, 2001 to Unger et al., entitled “Independent Selective such as cable systems. CA systems come as matched setsi Encryptions of Program Content for Dual Carriage”, and one part is integrated into the cable system headend and provisional patent application Ser. No. 60/304,131 ?led Jul. encrypts premium content, the other part provides decryp 10, 2001 to Candelore et al., entitled “Method for AlloWing tion and is built into the set-top boxes (STB) installed in Multiple CA Providers to Interoperate in a Content Delivery user’s homes. Several CA systems are used in the cable System by Partial Scrambling Content on a Time Slice industry including those provided by NDS (N eWport Beach, Basis” and to US. provisional patent application Ser. No. Calif.), Motorola (Schaumberg, Ill.) and Scienti?c Atlanta 60/343,710, ?led on Oct. 26, 2001 to Candelore et al., (Atlanta, Ga.). This matched set aspect of CA systems has entitled “Television Encryption Systems”, docket number the effect that the “legacy” vendor is locked in as the SNY-R4646.01 entitled “Critical Packet Partial Encryption” supplier of additional STBs. Since the various technologies to Unger et al. This application is also related to Ser. No. for conditional access are not mutually compatible (and are 10/038,217; docket number SNY-R4646.02 entitled “Time often proprietary), any neW potential supplier is forced to Division Partial Encryption” to Candelore et al., Ser. No. license the legacy CA. Thus, the cable operator ?nds itself 10/038,032; docket number SNY-R4646.03 entitled unable to acquire neWer technology or competing technol “Elementary Stream Partial Encryption” to Candelore et al., ogy from other set-top box manufacturers since the tech Ser. No. 10/037,914; and docket number SNY-R4646.05 nology oWners are often unWilling to cooperate, or charge entitled “Decoding and Decrypting of Partially Encrypted reasonable license fees. This in?exibility can be especially Information” to Unger et al., Ser. No. 10/037,498. These troublesome When cable companies With disparate CA sys patent applications are hereby incorporated by reference tems are merged. Service providers Would like more than herein. one source for STBs for any number of reasons. COPYRIGHT NOTICE [0006] Once a cable operator picks an encryption scheme, it is dif?cult to change or upgrade the content encryption [0002] A portion of the disclosure of this patent document scheme Without introducing a backWard compatible decod contains material Which is subject to copyright protection. ing device (eg set-top box). Providing multiple mode The copyright oWner has no objection to the facsimile capability in neW set-top boxes to handle multiple encryp reproduction of the patent document or the patent disclosure, tion systems can add substantial cost to any neW set-top box, as it appears in the Patent and Trademark Of?ce patent ?le providing that the technology can be made available to the or records, but otherWise reserves all copyright rights What STB vendor to provide the multiple decryption capability. soever.
Recommended publications
  • Mcgraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Mcgraw-Hill Abc
    Y L F M A E T Team-Fly® Streaming Media Demystified Michael Topic McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill abc Copyright © 2002 by The McGraw-Hill Companies, Inc. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distrib- uted in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. 0-07-140962-9 The material in this eBook also appears in the print version of this title: 0-07-138877-X. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in cor- porate training programs. For more information, please contact George Hoare, Special Sales, at george_hoare@mcgraw- hill.com or (212) 904-4069. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the work. Use of this work is subject to these terms.
    [Show full text]
  • Virtual Machine for Secure Embedded Systems
    Universiteit Leiden Opleiding Informatica Virtual Machine for Secure Embedded Systems Name: Manuel Spierenburg Date: 05/08/2017 1st supervisor: Dr. ir. Todor Stefanov 2nd supervisor: Dr. Teddy Zhai 2nd reader: Dr. Kristian Rietveld MASTER'S THESIS Leiden Institute of Advanced Computer Science (LIACS) Leiden University Niels Bohrweg 1 2333 CA Leiden The Netherlands Acknowledgments First of all I want to thank Teddy Zhai who helped and supported my throughout the work of this thesis. Even after he already left the company, where I was working on this project, he guided me and helped me to finish. Without him this would not have been possible. Also I want to thank Vladimir Zivkovic for giving me this project which gave me the opportunity to finish my master program. Further I want to thank Irdeto B.V. for giving me the time and equipment, especially the access to the ST platform, which allowed me to conduct the experiments for this thesis. Last but not least I want to thank Todor Stefanov and Kristian Rietveld for giving my advice and for their patience. 1 Abstract In the Broadcasting and Over-The-Top media-service industries, video content which is delivered to the customer needs to be secured by encrypting or scrambling the content. The content then needs to be decrypted or unscrambled at the end-users location. A common technique is to use a hardware device which includes a secret key for the cryptographic operations. Many television providers use a Set-top Box (STB) which is installed at the end-users home to execute this task.
    [Show full text]
  • (C) 2002-2012 Ludovic Rousseau # # This Program Is Free Software
    # # smartcard_list.txt # Copyright (C) 2002-2012 Ludovic Rousseau # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # This list contains a match between an ATR and a card type # The list is sorted for edition purposes # # You can get the latest version of this file from: # http://ludovic.rousseau.free.fr/softwares/pcsc-tools/smartcard_list.txt # # $Id: smartcard_list.txt 6228 2012-02-19 13:25:29Z rousseau $ # # syntax: # ATR in regular expression form # \t descriptive text # \t descriptive text # \t descriptive text # empty line 3B 02 14 50 Schlumberger Multiflex 3k 3B 02 53 01 Gemplus GemClub Memo 3B 04 00 00 00 00 Laundromat payment card 3B 04 07 3C 85 92 OLD Spanish Prepaid phone cards (pesetas) provided by Telefonica 3B 04 07 3C 85 9A OLD Spanish Prepaid phone cards (pesetas) provided by Telefonica 3B 04 07 3C 89 10 OLD Spanish Prepaid phone cards (pesetas) provided by Telefonica 3B 04 07 3C 89 18 OLD Spanish Prepaid phone cards (pesetas) provided by Telefonica 3B 04 07 3C 89 92 OLD Spanish Prepaid phone cards (pesetas) provided by Telefonica 3B 04 07 3C 89 9A OLD Spanish Prepaid phone cards (pesetas) provided by Telefonica 3B 04 07 3C 8C 10 OLD Spanish Prepaid phone cards (pesetas) provided by Telefonica 3B 04 09 9C 2B 83 T.P.G.
    [Show full text]
  • Template BR Rec 2005.Dot
    Rep. ITU-R BT.2070 1 REPORT ITU-R BT.2070 Broadcasting of content protection signalling for television (2006) 1 Introduction This Report comprises a report on the current “state of the art” of digital content protection for broadcast television and related services. Recent rapid evolution in the nature of consumer use of broadcast and internet services has changed many of the old assumptions made by broadcasters and television equipment manufacturers. Television broadcasts can now be easily recorded using high-capacity personal video recorders (PVRs), and this content can now be shared with others over high-speed internet connections or by burning to high-capacity removable media such as DVDs. Old assumptions that a set-top-box connects to a single, display-only, television set are fading fast. Consumers are increasingly aware of alternative ways to enjoy broadcast content, and are always looking for newer and more rewarding experiences. Accordingly, there is an urgent need for content owners and broadcasters to balance the need to protect their investment with potential loss of acceptability to an educated and technically knowledgeable user community. 1.1 Background Working Party 6M (WP 6M) has determined that a compendium of information should be disseminated and carried forward in preparation for a Report on this subject area. Building upon the initial work of previous meetings of WP 6M, it was determined that in order to develop principles which can safeguard the interests of broadcasters and the public in copy protection signalling for television, a number of topics need to be addressed. To this end, WP 6M has begun to develop a content protection model as described below.
    [Show full text]
  • CSCIP Module 6 - Mobile-NFC-Pay TV Final - Version 2 - October 8, 2010 1 for CSCIP Applicant Use Only
    Module 6: Smart Card Usage Models – Mobile, NFC and Pay TV Smart Card Alliance Certified Smart Card Industry Professional Accreditation Program Smart Card Alliance © 2010 CSCIP Module 6 - Mobile-NFC-Pay TV Final - Version 2 - October 8, 2010 1 For CSCIP Applicant Use Only About the Smart Card Alliance The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is the single industry voice for smart cards, leading industry discussion on the impact and value of smart cards in the U.S. and Latin America. For more information please visit http://www.smartcardalliance.org . Important note: The CSCIP training modules are only available to LEAP members who have applied and paid for CSCIP certification. The modules are for CSCIP applicants ONLY for use in preparing for the CSCIP exam. These documents may be downloaded and printed by the CSCIP applicant. Further reproduction or distribution of these modules in any form is forbidden. Copyright © 2010 Smart Card Alliance, Inc. All rights reserved. Reproduction or distribution of this publication in any form is forbidden without prior permission from the Smart Card Alliance. The Smart Card Alliance has used best efforts to ensure, but cannot guarantee, that the information described in this report is accurate as of the publication date. The Smart Card Alliance disclaims all warranties as to the accuracy, completeness or adequacy of information in this report.
    [Show full text]
  • An Identity Management Infrastructure for Secure Personalized IPTV Services
    An Identity Management Infrastructure for Secure Personalized IPTV Services Daniel Díaz Sánchez1,*, Florina Almenárez1, Andrés Marín1, Eugen Mikoczy2, 3 3 Peter Weik , and Thomas Magedanz 1 Telematic Engineering Department, Carlos III University of Madrid Avda. Universidad, 30, 28911 Leganés (Madrid), Spain 2 Slovak University of Technology, (Bratislava), Slovakia 3 Technische Universität Berlin, (Berlin), Germany Abstract. This article focus on IPTV security and IPTV service personalization by the introduction of an Identity Provider as new participant in IPTV service provision that deals with authentication, user profile and device profile management. The Identity Provider, integrated as part of the Telco operator, would provider user profiles with a wider scope than application specific profiles, enabling high personalization of services and improvement of user experience. Paper gives overview about existing IPTV security technologies but also describe novel architecture for secure personalized NGN based IPTV services. Keywords: IPTV security, IdM, NGN based IPTV. 1 Introduction IPTV is envisioned as the next step in user’s TV experience with a provision of highly personalized services ranging from linear television, video on demand (VoD), near video on demand (n-VoD), personal video record (PVR) to advance blended services as messaging, chatting, presence and web 2.0 mashups. Traditional broadcast-only content protection, as DVB Conditional Access [1], can not authorize users before they acquire the signal so contents are protected before delivered over the air. In this scenario, user authentication and content protection are performed entirely by the customer’s hardware. DVB’s major drawback is the absence of the concept of “user” that is substituted by the concept of customer (subscription).
    [Show full text]
  • Internet Trends 1995
    Internet Trends 1995 Mary Meeker February 1996 MORGAN STANLEY U.S. Investment Research February 1996 Mary Meeker (212) 761-8042 / [email protected] Technology/New Media Chris DePuy (212) 761-6562 / [email protected] The Internet Report Morgan Stanley Global Technology Group: Other Contributors: Data Networking: George Kelly Economist: Steve Roach PC Software/Hardware & New Media: Mary Meeker Publishing: Doug Arthur Enterprise Software: Chuck Phillips Telecommunications Services: Stephanie Comfort Server Hardware: Steve Milunovich Cable Television: Rich Bilotti Telecommunications Equipment: Neil Danzger Financial Services: David Hilder Computer Services: Mark Wolfenberger Emerging Growth: Mike Sorell Semiconductors: Alan Rieper Semi. Equip., Wireless & Peripherals: Robert Maire Design Software: Alkesh Shah Distribution: Shelby Fleck Cross Industry: Bob Austrian European Technology: Angela Dean Japanese Technology: Takatoshi Yamamoto Japanese Technology: Mitsuko Morita Japanese Technology: Noriko Oki Asia/Pacific Electronics: Richard Wei This memorandum is based on information available to the public. No representation is made that it is accurate or complete. This memorandum is not an offer to buy or sell or a solicitation of an offer to buy or sell the securities mentioned. Morgan Stanley & Co. Inc. and others associated with it may have positions in and effect transactions in securities of companies mentioned and may also perform or seek to perform investment banking services for those companies. MORGAN STANLEY Acknowledgments The authors would like to thank the individuals who helped Morgan Stanley's Technology investment banking team has make this book possible. A report of this scope would not also been critical in helping us uncover emerging have been possible without a lot of hard work and a lot of companies in all areas of technology, most recently related support from many people.
    [Show full text]
  • BOX 91 Hardware PYE Radio in Wooden Cabinet
    BOX 91 Hardware PYE Radio in Wooden Cabinet Radio Hardware Electronic Instrument Corp Model A-460 Field Strength Meter Television Field Strength Meter Hardware Super Sonic Television Amplifier TV Amplifier Hardware Mullard Model 402 AM/Shortwave Radio (made in NZ) AM/SW Radio Hardware Blonder-Tongue BTC 99R Ultraverter All Channel UHF Converter UHF Converter Hardware Blonder-Tongue BTU 2B Ultraverter All Channel UHF Converter UHF Converter (2 units) Hardware Blonder-Tongue BTU 2R Ultraverter All Channel UHF Converter UHF Converter Hardware Jerrold UHF Converter UHF Converter Hardware Hy-Gain Transmit/Receive Direction Control H-IV/CD-45-II Tx/Rx Controller Hardware Sutton Model 22B Converter TV Booster Converter TV Booster BOX 92 Magazine Coop's Technology Digest: PB-Magazine Feb 28 2001 Issue 01-02-75 Mar 28 2001 Issue 01-03-76 May 02 2001 Issue 01-04-77 May 28 2001 Issue 01-05-78 Jun 29 2001 Issue 01-06-79 Aug 31 2001 Issue 01-08-81 Nov 02 2001 Issue 01-09-82 Dec 05 2001 Issue 01-10-83 Jan 11 2002 Issue 02-01-84 Mar 06 2002 Issue 02-03-86 Apr 05 2002 Issue 02-04-87 May 06 2002 Issue 02-05-88 Jun 07 2002 Issue 02-06-89 Jul 24 2002 Issue 02-07-90 Aug 29 2002 Issue 02-08-91 BOX 93 Binder Binder-FM Development paper Radio-Craft Magazine from 1940-1949. Binder Binder-TV FM DX paper Indexed from 1940-1960. Brochure ARRL club info paper Article Satellite Times-It's A Wonderful World, paper Bob Cooper (May-June 1995) Diskettes Geoclock (1993) 3 3.5-inch diskettes in envelope Documents Miscellaneous personal documents paper Book Who, When, How-Turks
    [Show full text]
  • DVB-CPCM); Part 12: CPCM Implementation Guidelines
    ETSI TR 102 825-12 V1.1.1 (2011-03) Technical Report Digital Video Broadcasting (DVB); Content Protection and Copy Management (DVB-CPCM); Part 12: CPCM Implementation Guidelines 2 ETSI TR 102 825-12 V1.1.1 (2011-03) Reference DTR/JTC-DVB-222-12 Keywords broadcast, DVB ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.
    [Show full text]
  • A General Quantitative Cryptanalysis of Permutation-Only Multimedia Ciphers Against Plaintext Attacks
    NOTICE: This is the author’s version of a work that was accepted by Sig- nal Processing: Image Communication in January 2008. Changes resulting from the publishing process, such as peer review, editing, corrections, struc- tural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version has been published in Signal Processing: Image Communication, vol. 23, no. 3, pp. 212-223, 2008, DOI: 10.1016/j.image.2008.01.003. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Shujun Li a,∗, Chengqing Li b, Guanrong Chen b, Nikolaos G. Bourbakis c and Kwok-Tung Lo d aFernUniversit¨atin Hagen, Lehrgebiet Informationstechnik, Universit¨atsstraße 27, 58084 Hagen, Germany bDepartment of Electronic Engineering, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong, China cInformation Technology Research Institute, College of Engineering and Computer Science, Wright State University, 3640 Glenn Hwy, Dayton, OH 45435, USA dDepartment of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong SAR, China Abstract In recent years secret permutations have been widely used for protecting differ- ent types of multimedia data, including speech files, digital images and videos. Based on a general model of permutation-only multimedia ciphers, this paper per- forms a quantitative cryptanalysis on the performance of these
    [Show full text]
  • DVB-SCENE Issue 5
    Edition No. 05 March 2003 DVB - SCENE Tune in to Digital Convergence Tune Press Red To PPress Select 05 The Standard for the Digital World This issue’s highlights > MHP sparkles in the US with GEM > DVB 2.0 Making Progress > What is DVB-X? > Advanced Audio & Video Coding > DVB-S2 - Next generation > Service requirements for DVB-T > Copy Protection Executive Director Peter MacAvock, 10 YEARS AFTER A word from the DVB Project Office DVB turns 10 in 2003. One often for quite a while - since 1995 to be NEW wonders if the Project continues to have precise. It still continues to be at the relevance in the world of broadcasting, leading edge of technology thanks to the MEMBERS especially since there have been many latest developments in receiving changes in television. Digital television technologies - evidence of a truly future- Force UK Ltd is a reality, but the harsher realities of proof specification. All DVB-T eyes are Fujitsu-Siemens Computers GmbH the economic situation have meant that on Berlin at the moment as they proceed interactive television, once thought of as towards analogue switch-off at an Techno Trend AG the panacea of the broadcaster and unbelieveable pace. Since the launch manufacturers, hasn’t yet delivered on there in November 2002, 70,000 its promises. receivers have been sold which is a DVB-SCENE : 03 significant number for a small Published by the DVB Project Office, This hasn’t stopped DVB preparing for geographic region completely dominated c/o European Broadcasting Union, the day when we all “use” our TVs.
    [Show full text]
  • CKET FILE Copy ORIGINAL ------~ -~
    DOCKET FILE COpy ORIGINAL --------------- ~ -~ --------- --. ....---... BROADCAST COMMUNICA TJON SYSTEMS ',','::- ",':.' 10 August 1993 Ms. Donna R. Searcy Secretary Federal Communications Commission 1919 M Street, N.W., Room 222 Washington D.C. 20554 Regarding: Cable R;gulatiOn Proceeding on Compatibility Between Cable Systems and Consumer Electronic Equipment ET Docket No. 93-7 - , Dear Ms. Searcy, Enclosed are the original and nine copies of the Reply Comments filed by The Titan Corporation ("Titan") in the above-referenced proceedings. Please address any questions concerning this letter to the undersigned. Sincerely, C~ 0~.JIV Charles F. N wby Director, Broadcast Communication Systems Enclosures No. of Copies rec.Q.±9 List ABCDE THE TITAN CORPORATION 3030 Science Park Road· San Diego CA 92121 TEL (619) 552-9797 • FAX (619) 597-9055 DOCKET FILE COpy ORIGINAL Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 AUG 101995 In the Matter of Implementation of Section 17 of the Cable Television Consumer Protection and Competition Act of 1992 Compatibility Between Cable Systems and Consumer Electronics Equipment REPLY COl\lMENTS OF THE TITAN CORPORATION. August 10, 1993 The Titan Corporation 3033 Science Park Road San Diego CA 92121 (619) 552-9797 Table of Contents 1 INTRODUCTION. .................................... .. 1 2 THE COMMISSION MUST RECOGNIZE THE PUBLIC INTEREST IN DEFINING THE ROLES AND TRUE BOUNDARY LINES DELINEATING BETWEEN THE ACCESS CONTROL AND CONSUMER ELECTRONICS FUNCTIONS. ........................................ .. 3 2.1 The Hardware and System Distinction Between Decoding Functions and Cryptographic Functions ............................. .. 3 2.2 The Commission Must Favor Non-Duplication of Hardware in Consumer Electronics Equipment and Access Control Equipment. 6 2.3 Promotion of Competition in the Supply of Access Control Systems 7 3 RELATION TO THE ADVANCED TELEVISION STANDARDIZATION PROCEEDING ......................................
    [Show full text]