Verification of the source of program information in a conditional access system
First Claim
1. A method, in a cable television system comprising a programming source and a set top terminal, of verifying said programming source at said set top terminal, the method comprising the steps ofat said programming source,providing said programming information, a control word, and a shared secret as inputs to a secure hash function;
- using at least a portion of an output from said secure hash function as a source authentication;
encrypting said control word to generate an encrypted control word; and
transmitting said source authentication, said programming information, and said encrypted control word; and
at said receiver,receiving said source authentication, said programming information, and said encrypted control word;
decrypting said encrypted control word to recover therefrom said control word;
providing said programming information, said control word, and said shared secret as inputs into said secure hash function;
using at least a portion of an output from said secure hash function as a receiver authentication; and
comparing said source authentication with said receiver authentication, the programming information and the control word being authentic when said source authentication and said receiver authentication are the same.
6 Assignments
0 Petitions
Accused Products
Abstract
A cable television system provides conditional access to services. The cable television system includes a headend from which service "instances", or programs, are broadcast and a plurality of set top units for receiving the instances and selectively decrypting the instances for display to system subscribers. The service instances are encrypted using public and/or private keys provided by service providers or central authorization agents. Keys used by the set tops for selective decryption may also be public or private in nature, and such keys may be reassigned at different times to provide a cable television system in which piracy concerns are minimized.
-
Citations
17 Claims
-
1. A method, in a cable television system comprising a programming source and a set top terminal, of verifying said programming source at said set top terminal, the method comprising the steps of
at said programming source, providing said programming information, a control word, and a shared secret as inputs to a secure hash function; -
using at least a portion of an output from said secure hash function as a source authentication; encrypting said control word to generate an encrypted control word; and transmitting said source authentication, said programming information, and said encrypted control word; and at said receiver, receiving said source authentication, said programming information, and said encrypted control word; decrypting said encrypted control word to recover therefrom said control word; providing said programming information, said control word, and said shared secret as inputs into said secure hash function; using at least a portion of an output from said secure hash function as a receiver authentication; and comparing said source authentication with said receiver authentication, the programming information and the control word being authentic when said source authentication and said receiver authentication are the same. - View Dependent Claims (2, 3)
-
-
4. A head end transmitter for creating verifiable programming information that is transmitted within a cable television system, the head end transmitter comprising:
-
a control word generator for generating a control word; a device for securely maintaining a shared secret; a processor for performing a secure hash function having inputs of said control word, said shared secret, and said programming information, for creating a source authentication from at least a portion of an output from said secure hash function; and a transmitter for transmitting said source authentication, said programming information, and said control word. - View Dependent Claims (5, 6, 7)
-
-
8. A cable television system for verifying the source of programming information, the cable television system comprising:
-
a programming source for providing inputs of a shared secret, a control word, and said programming information to a secure hash function, for receiving as an output thereof a source authentication, and for encrypting and transmitting said inputs and said source authentication; a receiver for receiving said source authentication and said inputs, creating a receiver authentication from at least a portion of an output of a secure hash function having inputs of said shared secret, said control word, and said programming information, for comparing said source authentication with said receiver authentication, and for accepting the programming information as authentic when the two are the same; and a transmission medium over which said transmission is broadcast from said programming source to said receiver. - View Dependent Claims (9, 10, 11)
-
-
12. A method of verifying a source of information in a conditional access system with a source and a receiver, comprising the steps of:
-
using as inputs to a secure hash function system information, a control word, and a secret key, the secret key being shared by the source and the receiver and the control word being a key used in decrypting encrypted information and data transmitted over the conditional access system; performing the secure hash function at the source and using at least a portion of the output of the secure hash function performed at the source as a source authenticator; performing the secure hash function at the receiver and using at least a portion of the output of the secure hash function performed at the receiver as a receiver authenticator; and comparing at the receiver the source authenticator and the receiver authenticator and verifying the source of information in the conditional access system as the source if the source authenticator and the receiver authenticator match. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification