Method for detection of a hacked decoder
First Claim
1. A method of identifying a receiver device from which pirated video decryption keys have been obtained, comprising:
- splitting a population of receiver devices into a compromised population and a non-compromised population N groups;
detecting a pirated video decryption key in one or more of the N groups;
aggregating the groups comprising those groups in which a pirated video decryption key was not detected into a non-compromised population group;
isolating the non-compromised population group;
organizing the compromised population of receiver devices into a plurality of N new groups, where one of the N new groups is the non-compromised population group and the remainder of the N new groups is the group or groups containing the pirated video decryption key divided into subgroups;
associating the N new groups with a plurality of N decryption keys, where each of the N new groups is associated with one of a plurality of N decryption keys;
causing the plurality of N decryption keys to be obtained by their associated N new groups of receiver devices by direct delivery or by derivation at the receiver devices; and
encrypting one or more entitlement control messages (ECMs) using one of a plurality of N periodic keys so as to produce N sequences of content keys respectively associated with the N new groups in order to segregate the receiver devices by virtue of their use of multiple decryption keys to decrypt content.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of identifying a receiver device from which pirated video decryption keys have been obtained consistent with certain embodiments involves organizing a population of receiver devices into a plurality of N groups; associating the N groups with a plurality of N decryption keys, where each of the N groups is associated with one of the N decryption keys, where the N decryption keys are used for either decryption of content or decryption of other decryption keys; causing the plurality of N decryption keys to be obtained by their associated N groups of receiver devices by direct delivery or by derivation at the receiver devices; and identifying a pirated key as being associated with one of the N groups so as to identify the receiver device from which the pirated video decryption keys have been obtained as belonging to one of the N groups. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.
-
Citations
30 Claims
-
1. A method of identifying a receiver device from which pirated video decryption keys have been obtained, comprising:
-
splitting a population of receiver devices into a compromised population and a non-compromised population N groups; detecting a pirated video decryption key in one or more of the N groups; aggregating the groups comprising those groups in which a pirated video decryption key was not detected into a non-compromised population group; isolating the non-compromised population group; organizing the compromised population of receiver devices into a plurality of N new groups, where one of the N new groups is the non-compromised population group and the remainder of the N new groups is the group or groups containing the pirated video decryption key divided into subgroups; associating the N new groups with a plurality of N decryption keys, where each of the N new groups is associated with one of a plurality of N decryption keys; causing the plurality of N decryption keys to be obtained by their associated N new groups of receiver devices by direct delivery or by derivation at the receiver devices; and encrypting one or more entitlement control messages (ECMs) using one of a plurality of N periodic keys so as to produce N sequences of content keys respectively associated with the N new groups in order to segregate the receiver devices by virtue of their use of multiple decryption keys to decrypt content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of identifying a receiver device from which pirated video decryption keys have been obtained, comprising:
-
splitting a population of receiver devices into N groups; detecting a pirated video decryption key in one or more of the N groups; aggregating the groups comprising those groups in which a pirated video decryption key was not detected into a non-compromised population group; isolating the non-compromised population group; organizing the compromised population of receiver devices into a plurality of N new groups, where one of the N new groups is the non-compromised population group and the remainder of the N new groups is the group or groups containing the pirated video decryption key divided into subgroups; associating the N new groups with a plurality of N decryption keys, where each of the N new groups is associated with one of the N decryption keys; causing the plurality of N decryption keys to be obtained by their associated N new groups of receiver devices by direct delivery or by derivation at the receiver devices; encrypting one or more entitlement control messages (ECMs) using a plurality of N periodic keys so as to produce N sequences of content keys respectively associated with the N new groups; identifying a pirated key as being associated with one of the N new groups so as to identify the receiver device from which the pirated video decryption keys have been obtained as belonging to one of the N new groups; and testing authenticated encryption keys in a receiver that is suspected of decoding content utilizing a periodic key that is not legally assigned to that receiver, where said testing of authenticated encrypted keys comprises delivering multiple sets of data content comprising multiple conditional access (CA) packets, each packet of which is operative to eliminate receivers and groups of receivers such that each testing operation narrows down the field of receiver identities. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method of identifying a receiver device from which pirated video decryption keys have been obtained, comprising:
-
splitting a population of receiver devices into N groups; detecting a pirated video decryption key in one or more of the N groups; aggregating the groups comprising those groups in which a pirated video decryption key was not detected into a non-compromised population group; isolating the non-compromised population group; organizing the compromised population of receiver devices into a plurality of N new groups, where one of the N new groups is the non-compromised population group and the remainder of the N new groups is the group or groups containing the pirated video decryption key divided into subgroups; associating the N new groups with a plurality of N content keys that are derived from N periodic keys, where each of the N new groups is associated with one of the N periodic keys and content keys; causing the plurality of N periodic keys and N content keys to be obtained by their associated N new groups of receiver devices by direct delivery or by derivation at the receiver devices; encrypting an entitlement control message (ECMs) using the N periodic keys so as to produce the N sequences of content keys respectively associated with the N new groups; identifying a pirated key as being associated with one of the N new groups so as to identify the receiver device from which the pirated video decryption keys have been obtained as belonging to one of the N new groups; testing authenticated encryption keys in a receiver that is suspected of decoding content utilizing a periodic key that is not legally assigned to that receiver, where said testing of authenticated encrypted keys comprises delivering multiple sets of data content comprising multiple CA packets, each packet of which is operative to eliminate receivers and groups of receivers such that each testing operation narrows down the field of receiver identities to a single receiver identity; and revoking the identified receiver. - View Dependent Claims (25)
-
-
26. A method of identifying a receiver device from which pirated video decryption keys have been obtained, comprising:
-
splitting a population of receiver devices into N groups; detecting a pirated video decryption key in one or more of the N groups; aggregating the groups comprising those groups in which a pirated video decryption key was not detected into a non-compromised population group; isolating the non-compromised population group; organizing the compromised population of receiver devices into a plurality of N new groups, where one of the N new groups is the non-compromised population group and the remainder of the N new groups is the group or groups containing the pirated video decryption key divided into subgroups; associating the N new groups with a plurality of N decryption keys, where each of the N new groups is associated with one of the N decryption keys, where the N decryption keys are used for either decryption of content or for decryption, calculation or derivation of other decryption keys; causing the plurality of N periodic keys and N content keys to be obtained by their associated N groups of receiver devices by direct delivery or by derivation at the receiver devices; encrypting one or more entitlement control messages (ECMs) using one of a plurality of N periodic keys so as to produce N sequences of content keys respectively associated with the N new groups in order to segregate the receiver devices by virtue of their use of multiple decryption keys to decrypt content; and identifying a pirated key as being associated with one of the N new groups so as to identify the receiver device from which the pirated video decryption keys have been obtained as belonging to one of the N new groups. - View Dependent Claims (27, 28, 29, 30)
-
Specification