Conditional access overlay partial encryption using MPEG transport continuity counter
First Claim
1. A partially encrypted signal comprising:
- a plurality of encrypted packets, a portion of said encrypted packets encrypted according to a first encryption scheme to define first encrypted packets and another portion of said encrypted packets encrypted according to a second encryption scheme to define second encrypted packets; and
a plurality of unencrypted packets, wherein at least a portion of said unencrypted packets, at least one of said first encrypted packets, and at least one of said second encrypted packets are indistinguishable from one another based upon a packet identifier, and wherein said at least one each of said first and second encrypted packets being indistinguishable from one another based upon said packet identifier are also indistinguishable based upon a continuity count.
4 Assignments
0 Petitions
Accused Products
Abstract
A conditional access overlay system utilizing partial encryption without requiring additional program identifiers. The conditional access overlay system generates duplicate critical packets for separate encryption that are sent using the same packet identifier. The rest of the content stream is sent in the clear. However, these duplicated packets are sent without incrementing a continuity counter relative to one another. The overlay packets with non-incremented continuity counter are sent as the second packet immediately following the original critical packet. At the receivers, the incumbent set-top will use the first of the two encrypted packets while the overlay set-top is programmed to use the second of the two encrypted packets. Therefore, methods for verifying alignment of associated packets may be used to distinguish between multiple encryption methods in conditional access overlay systems.
-
Citations
30 Claims
-
1. A partially encrypted signal comprising:
-
a plurality of encrypted packets, a portion of said encrypted packets encrypted according to a first encryption scheme to define first encrypted packets and another portion of said encrypted packets encrypted according to a second encryption scheme to define second encrypted packets; and
a plurality of unencrypted packets, wherein at least a portion of said unencrypted packets, at least one of said first encrypted packets, and at least one of said second encrypted packets are indistinguishable from one another based upon a packet identifier, and wherein said at least one each of said first and second encrypted packets being indistinguishable from one another based upon said packet identifier are also indistinguishable based upon a continuity count. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of partially encrypting content comprising the steps of:
-
packetizing said content into a plurality of packets and at least a portion of said plurality of packets having an identical packet identifier;
reproducing a critical packet to produce duplicate packets having said identical packet identifier;
encrypting one of said duplicated packets according to a first encryption scheme to produce a first encrypted packet and encrypting the other of said duplicated packets according to a second encryption scheme to produce a second encrypted packet; and
distinguishing between said first and second encrypted packets having said identical packet identifier based upon the alignment of said first and second encrypted packets relative to one another. - View Dependent Claims (7)
-
-
8. A method of processing packets, comprising the steps of:
-
receiving first a first encrypted packet having a first packet identifier and a first continuity counter;
receiving second a second encrypted packet having said first packet identifier and said first continuity counter, wherein said first and second encrypted packets were encrypted according to first and second encryption schemes, respectively;
distinguishing between said first and second encrypted packets based upon the order said first and second encrypted packets are received; and
performing one of the following steps;
discarding said first encrypted packet because said second encrypted packet was received subsequent to receiving said first encrypted packet;
ordiscarding said second encrypted packet because said first encrypted packet was received before receiving said second encrypted packet. - View Dependent Claims (9)
-
-
10. A method of decoding partially encrypted content comprising the steps of:
-
receiving partially encrypted content comprising unencrypted content, first encrypted content encrypted under a first encryption scheme and second encrypted content encrypted under a second encryption scheme;
selecting one of said first and second encrypted content to decrypt based upon the alignment of said first and second encrypted content relative to one another;
decrypting said selected one of said first and second encrypted content to produce decrypted content; and
decoding said unencrypted content and said decrypted content to decode said partially encrypted content. - View Dependent Claims (11, 12)
-
-
13. A television set-top box comprising:
-
a receiver that receives;
a plurality of unencrypted packets;
a plurality of first encrypted packets encrypted according to a first encryption scheme; and
a plurality of second encrypted packets encrypted according to a second encryption scheme; and
a decrypter that discards one of said first and second encrypted packets based upon the alignment of said first and second encrypted packets relative to one another and decrypts the other of said first and second encrypted packets. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method of managing multiple access control systems utilizing partially encrypting content, said method comprising:
-
reproducing a critical packet from packetized content to produce duplicate packets;
encrypting one of said duplicate packets according to a first encryption scheme to produce a first encrypted packet;
encrypting the other of said duplicate packets according to a second encryption scheme to produce a second encrypted packet;
transmitting said first and second encrypted packets along with unencrypted packets of said packetized content to at least one of said multiple control access systems; and
decrypting one of said first and second encrypted packets based upon the alignment of said first and second packets relative to one another. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification