EP1396135A1 - Method and system of conditional access to ip services - Google Patents
Method and system of conditional access to ip servicesInfo
- Publication number
- EP1396135A1 EP1396135A1 EP20020730365 EP02730365A EP1396135A1 EP 1396135 A1 EP1396135 A1 EP 1396135A1 EP 20020730365 EP20020730365 EP 20020730365 EP 02730365 A EP02730365 A EP 02730365A EP 1396135 A1 EP1396135 A1 EP 1396135A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- header
- field
- ecm
- data
- datagram
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
Definitions
- the present invention relates to the field of scrambling and controlling access to IP services.
- the invention relates more particularly to a method and a system for transmitting / receiving information with access control through a network using the IP protocol as well as a device making it possible to implement the method.
- This method can be used to control access to audiovisual streaming services over IP and to data broadcasting services broadcast by satellite over the Internet.
- IPSEC protection does not require modification of the server or of the application software installed at the client.
- the scrambling is generally applied to all traffic between the client and the server and not just to a specific service.
- the IPSEC standard cannot be used if one wishes to carry out selective scrambling on specific services.
- SSL Secure Socket Layer
- This technique uses protocol identifiers and port numbers to distinguish protected data from unprotected data. For example, a hyperlink on the network will use this technique if the protocol identifier says "HTTPS" instead of "HTTP”.
- HTTPS HyperText Transfer Protocol
- Data protected by SSL generally navigates through a connection to port 443 of the TCP server. Also, if the server receives a connection to port 443, it applies SSL scrambling to this connection and transmits the IP data to the client. This procedure allows the client and the server to distinguish protected data from that which is not.
- a drawback of this technique comes from its dependence on the TCP transport protocol used and therefore imposes the data format of this protocol on the data to be scrambled.
- the object of the invention is to remedy the drawbacks of the prior art described above by means of a method making it possible to scramble services I? a generic way and to control access to these services by means of an access control device such as a memory card.
- Another object of the invention is to overcome the constraints linked to the transport protocol.
- Another aim is to scramble IP data whatever the application using this data, in particular in the following service configurations:
- the data block is encapsulated in a UDP packet.
- the data block is encapsulated directly in an IP datagram.
- the scrambling step comprises the following phases:
- the data block comprises:
- the data block respects the following syntax: CAS_DATA_UNIT () ⁇
- the sequence (Payload) respects the following syntax: payload () ⁇ data bytes n bytes padding bytes p bytes,
- the header also includes a field (EDC) representing an error detection sequence.
- EDC error detection sequence
- UDP which is itself inserted into an IP datagram, in transmission, a source UDP port is allocated dynamically when the UDP link is opened.
- the allocation of the destination UDP port number can be carried out statically (optional configuration data dedicated by a regulatory authority) or else dynamically by a signaling protocol between the scrambler and the descrambler.
- the reception of IP / UDP datagrams by the end client comprises the following steps: - receiving the second IP datagram; - receive the UDP packet on the port, previously opened (static or dynamic port);
- Extract the data from the first Destination datagram send the extracted packet to the destination application.
- the reception of UDP datagrams by the end client comprises the following steps:
- the transmitted IP services are audiovisual streams over IP.
- the IP services transmitted are data transmitted by satellite via an IP network.
- the data are transmitted through an IP network by a transmitter comprising means for associating with the IP datagrams a header comprising at least one datum identifying the access control means and an indication of the scrambling method used.
- the transmitter according to the invention also comprises:
- this transmitter comprises an IP data flow server, a gateway comprising an IP scrambler, an ECM generator, an ⁇ MM generator and a database.
- the reception of the data transmitted through the network is carried out by a receiver comprising means for extracting the header from a scrambled datagram and means for activating at least one access condition or at least one secret key.
- the scrambling and access control system in an IP type network comprises a transmitter and a receiver as described above.
- the IP services scrambling and access control device comprises a man-machine interface intended to define the services to be scrambled and to enter the access conditions or secret keys.
- the access control means comprise a memory card for transporting the secret key.
- FIG. 1 schematically shows a data transmission / reception system with access control according to the invention
- FIG. 2 schematically illustrates the steps of defining the structure of a datagram according to one invention
- FIG. 4 schematically illustrates a first reception mode implemented in the method according to the invention
- Figure 5 schematically illustrates a second reception mode implemented in the method according to the invention
- FIG. 6 schematically shows a system of scrambling data in a point-to-point environment according to the invention.
- FIG. 1 schematically illustrates a system in which several data processing and transmission equipment are interconnected in a local area network 2 (LAN) which is connected, via the internet network 3, to several clients 4.
- LAN 2 includes an IP data flow server ⁇ , a gateway 8 comprising an IP scrambler, an ECM generator 12 (DVB access control message, Entitlement Control Message) EMM 14 (DVB access management message, Entitlement Management Message in English) and a database 16.
- LAN 2 is connected to a Web server 17.
- the WEB server 17 indicating the characteristics of the Application server (@IP_server, program_name , scrambling_active) is not necessarily on the same LAN 2.
- the IP data delivered by the stream server 6 can be audio visual services requiring the possession of an access right recorded in a memory card held by authorized clients 4. These audio visual services are scrambled by the IP scrambler integrated into the gateway 8 before being transmitted over the internet network 3.
- Each client 4 has equipment 18 comprising an access control device such as for example a memory card.
- the gateway 8 is provided with an HMI man-machine interface program enabling it: - to define the services to be scrambled; - enter access conditions or secret keys.
- the services to be scrambled are identified by a label to which corresponds a source IP address or a destination IP address depending on whether it is desired to scramble the data originating from a source and / or going to a destination.
- the scrambling of the data results from the connection of the service identifier (Idservice), characterized by the source address (s) and / or destination (d) IP datagrams, and a scrambling key.
- the renewal periodicity of this key is relatively low in systems not using a memory card (table I), and may be higher in systems implementing a card (table II). In these, it is called the control word.
- obtaining the control word is subject to the possession of rights previously entered in the card.
- the signage related to the implementation of the access control system using the memory card to restore the control words in the IP context covers the following services in order of priority: - data broadcasting services using the UDP / IP stack: IPSat (push, file transfer);
- IP multipoint flow IP multipoint flow
- UDP / IP stack videoconferencing or multipoint audioconferencing, audiovisual broadcasting
- FIG. 2 schematically illustrates the steps for creating a datagram according to the invention.
- the data to be transmitted 20 are first cut into packets 21 which can be of variable lengths.
- IP 21 is then associated with an IP header 22 to constitute a first IP datagram 23.
- IP is based on the following principle: - Scrambling of the first IP 23 datagram
- This header 24 includes a discriminator 25 identifying the type of access control system implemented to scramble the IP datagram 23, and control data 27. - Concatenation of this header 24 and the IP datagram 23 to form a block of data 26; - Encapsulate this data block 26 in a UDP datagram.
- IP-CAS IP-Conditional Access System
- header_length representing the total length of the header 24
- the header 24 can also include a field (EDC) representing our error detection sequence. According to the invention, if (payload_scrambling_control ⁇ 00), the header 24 (Access_control_header) further includes a field (payload_descrambling_way) specifying the descrambling mode of the content of the payload.
- the header 24 also includes a field (ECM_CA_descriptor_flag) indicating the presence of at least one conditional access descriptor (ECM_CA_descriptor) in the header 24 of the datagram scrambled 23, and a field (ECM_flag) indicating, when its value is equal to 1, the presence of at least one ECM field () in the header of the scrambled datagram 23.
- ECM_CA_descriptor_flag indicating the presence of at least one conditional access descriptor in the header 24 of the datagram scrambled 23.
- the header 24 includes a field (Nb_ECM_CA_descriptor) indicating the number of blocks (ECM_CA_descr ⁇ ptor) present in this header 24 of the scrambled datagram 23.
- the header 24 also includes a field (access_control_header_start_sequence) or making it possible to identify the start of the header, a field (vers ⁇ on_number) indicating the current version of the header 24, a field (serv ⁇ ce_ID) indicating the reference of the service used, a field (payload_type) indicating the type of data transmitted, and a field (RUFO) reserved for future use.
- the header 24 also includes a field
- the header 24 (Access_control_header) also includes:
- IVOperator_ID_length indicating, when its value is other than zero, the presence and the length of the vector field for initializing the scrambler
- the header 24 also includes a field (ECM_CA_descr ⁇ ptor_flag) indicating, when its value is equal to 1, the presence of at least one conditional access descriptor (ECM_CA_desc ⁇ ptor) in the header 24 of the scrambled datagram 23, a field ( RUF2) reserved for future use.
- ECM_CA_descr ⁇ ptor_flag indicating, when its value is equal to 1, the presence of at least one conditional access descriptor (ECM_CA_desc ⁇ ptor) in the header 24 of the scrambled datagram 23, a field ( RUF2) reserved for future use.
- the header 24 includes a field (NB_ECM) indicating the number of ECM in the header 24 of the scrambled datagram 23.
- the header 24 includes a third field (RUF3) reserved for future use;
- the access control message includes:
- an ECM_ ⁇ ex pointer intended to differentiate several ECMs to select a particular ECM for descrambling
- the access control message has the following format: ECM () ⁇
- ECM_table 8 bits ⁇ where ECM_index represents the ECM associated with the conditional access descriptor, and
- ECM_table represents the structure of ECM.
- the ECM table includes: - an identification field (table_id)
- ECM-length a field indicating the length of an ECM
- table_id represents an 8-bit field that identifies the type of data contained in the table; - a field (descriptor_tag) indicating the start of an ECM conditional access descriptor;
- ECM_CA descriptor_length indicating the length of an ECM descriptor
- CA_system_ID representing an identifier of the access control system used
- conditional access descriptor (ECM_CA_descriptor) has the following format:
- ECM_mdex 8 bit for ( ⁇ 0; KN; ⁇ ++) ⁇ p ⁇ vate_data_bytes 8 bit
- ⁇ and the algorithm type identifier includes: - a CI_tag identifier; - a Cl-length field indicating the length of the identifier; a CI_value field indicating the value of the Cl-tag identifier.
- the algorithm type identifier scrambles this in the following format: TO ⁇
- the service operator includes:
- an identifier SOID_tag of the block allowing to describe the area of the service operator used in the smart card; - a SOID_length field indicating the length of said zone;
- SOID_value represents a field identifying a service area used in the smart card.
- FIG. 4 schematically illustrates the scrambling activated by the WEB server 17 - (step (c)) on the initiative of the client (step (a)).
- an active daemon on the WEB server 17 sends an activation request to the IP scrambler (step (b)) on reception of an HTTP request (a) from the client on a link with the “scrambling to activate ”(keyword in the URL ht tp: // @ IP: port / scrambled_program / program_name,).
- the scrambling scenario is as follows:
- the flow server 6 sends IP datagrams 23 in point-to-point mode or in Multipoint mode.
- the destination address of datagrams 23 is that of the client (point-to-point) or else a broadcast address (Multipoint).
- the IP scrambler optionally filters the IP datagrams 23 whose origin address is that of the flow server 6 and maintains a scrambling session by destination address. This filter acts at the Ethernet level in the diagram in Figure 4. 3) The IP scrambler then concatenates the header 24 (access_control_header) to the IP datagram 23 which is scrambled in step 2 then sends this field on a UDP stack to the same destination address as the initial datagram.
- the valuation of the UDP / IP tunnel fields in transmission is carried out according to the following mechanism:
- the scrambler generates an IP datagram with the following information: •
- the source IP address is the IP address of
- This address is a public IP address.
- the destination IP address is the destination address of the initial datagram.
- the source UDP port is allocated dynamically when the UDP stack is opened.
- the UDP port of the scrambled stream is not the same as the UDP port of the original stream in order to avoid loopback problems on the client computer.
- the known ports are the ports of 0 and 1023;
- the registered ports are those from 1024 to 49151;
- the dynamically allocated ports are those from 49152 to 65535.
- IP CAS IP address Translation
- daunbler software 35 is installed on the client computer (Windows, Linux, MacOS,). Two implementations are envisaged, either the use of a Pseudo-driver 40, or the use of loopback in "raw” mode. 1 - Use of a pseudo-driver.
- FIG. 5 illustrates this mode of implementation.
- the data is received on the interface of the access provider 42 to the internet network 3 (ISP) and forwarded via the IP stack 44 of the client machine to the descrambler 35 awaiting UDP data on the specific port IP_CAS.
- This descrambler 35 recovers data from the UDP datagram via the IP stack, extract the ⁇ d ⁇ sc ⁇ mmateur - access_control_header> header and descramble the original IP datagram.
- ISP internet network 3
- the descrambler 35 provides the IP datagram to the end client 4 awaiting data on the original destination port.
- the network pseudo-driver 40 In order to transmit this IP datagram to the end customer (local to the machine), the network pseudo-driver 40 must be developed under the IP stack: - This pseudo-driver is awaiting data from the descrambler 35 and provides it to the IP stack.
- the final application is waiting on its particular port and normally retrieves the data in clear after unencapsulating the original IP datagram by the IP / TCP or UDP stack.
- This solution can be implemented on an operating system allowing the addition of a 2nd network driver under the IP stack of the machine.
- the routing of the FAI 42 and pseudo-driver 40 drivers at the IP layer is done on an IP address specific to each network driver according to the following mechanism:
- This mechanism allows the recovery of the original datagram 23 without modification, making the descrambling function completely independent of the client. final. It only uses the IP stack in UDP / TCP mode when receiving data.
- the data is received on the FAI interface 42 and fed back via the IP stack 44 from the client machine to the descrambler 35 awaiting UDP data on the port specific IP_CAS.
- the descrambler 35 recovers the data from the UDP datagram via the IP stack 44 extracts the header 24 ⁇ discriminator - access_control_header> and descrambles the original IP datagram 23.
- the descrambler 35 supplies this IP datagram 23 to the end client awaiting data on the original destination port in UDP or in TCP.
- the IP datagram 23 is re-transmitted in the FAI / IP stack 42 via the IP stack 44 passing to the destination IP address the loopback IP address of the machine (127.0.0.0). This re-transmission takes place in RAW mode because the re-transmitted data constitute a complete IP frame which must not be modified.
- the loopback mechanism of the IP 44 stack therefore feeds the data without re-transmitting it.
- the descrambler 35 is on standby on its particular port and normally recovers the data in the clear after decapsulating the IP datagram by the IP / TCP / UDP stack.
- This solution can be implemented on an operating system allowing the use of RAW mode of the IP 44 stack in loopback on the transmitter side and is done according to the following mechanism:
- this mechanism uses only the IP stack 44 in UDP / TCP mode when receiving data to pass them to the descrambler 35 as when transmitting data to re-transmit them to the final application.
- FIG. 7 schematically represents a system for scrambling data in a point-to-point environment according to the invention.
- This system includes a terminal of a user 4, a service provider ⁇ , an ECM generator 12, a database 16, a server for presenting the offer 64, an editor for access conditions 66, a RTSP 72 audiovisual control gateway, an internet service provider 74.
- the following steps describe a user's access to a VOD service using a memory card.
- the principle can be extended to other types of Point-to-Point services. Access begins with a subscriber authentication phase. This phase takes place just after the subscriber has connected to the Internet service provider 74.
- the terminal of the user 4 goes up, its IP address, dynamically assigned by the access provider 74 at the time of the connection to the network, and the AU (unique address) of his card.
- Phase 1 Presentation of the offer.
- the user makes an HTTP request on a server presenting the offer 64.
- the presentation of the page is optional and can be managed directly by the operator.
- the page appears while at the request of the subscriber, when reloading rights for example.
- Phase 2 presupposes that the user has selected a particular service (eg choice of a film in a VoD service).
- a particular service eg choice of a film in a VoD service.
- phase 2 The first to the browser. : phase 2; - The second to the scrambling system: phase 2 '.
- the presentation server returns to the terminal in the HTTP response the complete URL of the film (ex: http: // served. Film-name.ram);
- Phase 3 launch of the film player execution program
- the RTSP server then opens a TCP session with the server concerned by the delivery of the film (here served ..).
- Phase 5 launch of the broadcast
- the stream server 6 then transmits the film in UDP / IP datagrams to the scrambling gateway with the source address, the server address and the destination address, the address of the final client.
- the 0 ′ gateway gateway whose Point-to-Point filters are activated automatically as soon as Point-to-Point services are detected in base 16, can then scramble generically (on @ origin) or personalized (on @ recipient) ) or depending on the URL the descending data.
- Phase 7 Closing a Point-to-Point session A Point-to-Point session can be closed by the scrambling gateway on time-out (no reception of packets from a given source or destination address for X seconds ).
- the maximum point-to-point time-out value is specified when configuring the general parameters of the equipment.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0105318 | 2001-04-19 | ||
FR0105318A FR2823936B1 (en) | 2001-04-19 | 2001-04-19 | METHOD AND SYSTEM FOR CONDITIONAL ACCESS TO IP SERVICES |
PCT/FR2002/001337 WO2002087190A1 (en) | 2001-04-19 | 2002-04-18 | Method and system of conditional access to ip services |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1396135A1 true EP1396135A1 (en) | 2004-03-10 |
Family
ID=8862485
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP20020730365 Withdrawn EP1396135A1 (en) | 2001-04-19 | 2002-04-18 | Method and system of conditional access to ip services |
Country Status (8)
Country | Link |
---|---|
US (1) | US20040128665A1 (en) |
EP (1) | EP1396135A1 (en) |
JP (1) | JP2004535704A (en) |
KR (1) | KR20030092083A (en) |
CN (1) | CN1518824A (en) |
CA (1) | CA2444435A1 (en) |
FR (1) | FR2823936B1 (en) |
WO (1) | WO2002087190A1 (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2839834B1 (en) * | 2002-05-17 | 2004-07-30 | Viaccess Sa | METHOD FOR DATA DISTRIBUTION WITH ACCESS CONTROL |
FR2890274A1 (en) * | 2005-08-30 | 2007-03-02 | France Telecom | Digital data broadcasting service address transforming method for telecommunication network, involves recovering data of broadcasting service address, and inserting part of identifying data in Internet protocol address of datagrams |
US8023973B2 (en) * | 2007-01-03 | 2011-09-20 | Motorola Solutions, Inc. | Expandable text messaging service protocol for use with a two-way radio transceiver |
RU2339077C1 (en) * | 2007-03-13 | 2008-11-20 | Олег Вениаминович Сахаров | Method of operating conditional access system for application in computer networks and system for its realisation |
WO2010039013A2 (en) * | 2008-10-01 | 2010-04-08 | Lg Electronics Inc. | Symbol-level random network coded cooperation with hierarchical modulation in relay communication |
JP5628408B2 (en) * | 2010-03-24 | 2014-11-19 | トムソン ライセンシングThomson Licensing | Method and apparatus for monitoring network service quality |
US8695060B2 (en) | 2011-10-10 | 2014-04-08 | Openpeak Inc. | System and method for creating secure applications |
US20150113506A1 (en) * | 2013-10-18 | 2015-04-23 | Openpeak Inc. | Method and system for adaptive loading of application |
US9100390B1 (en) | 2014-09-05 | 2015-08-04 | Openpeak Inc. | Method and system for enrolling and authenticating computing devices for data usage accounting |
US8938547B1 (en) | 2014-09-05 | 2015-01-20 | Openpeak Inc. | Method and system for data usage accounting in a computing device |
US20160071040A1 (en) | 2014-09-05 | 2016-03-10 | Openpeak Inc. | Method and system for enabling data usage accounting through a relay |
US9232013B1 (en) | 2014-09-05 | 2016-01-05 | Openpeak Inc. | Method and system for enabling data usage accounting |
US9350818B2 (en) | 2014-09-05 | 2016-05-24 | Openpeak Inc. | Method and system for enabling data usage accounting for unreliable transport communication |
US9232078B1 (en) | 2015-03-16 | 2016-01-05 | Openpeak Inc. | Method and system for data usage accounting across multiple communication networks |
CA3006418A1 (en) * | 2015-12-31 | 2017-07-06 | Cyber 2.0 (2015) Ltd. | Monitoring traffic in a computer network |
EP3635997B1 (en) * | 2017-06-06 | 2020-08-26 | Telefonaktiebolaget LM Ericsson (publ) | Technique for user plane function allocation |
CN109560945B (en) * | 2017-09-25 | 2021-02-12 | 华为技术有限公司 | Method, device and system for detecting service quality |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001010095A2 (en) * | 1999-07-30 | 2001-02-08 | Intel Corporation | Protection of communications |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5870474A (en) * | 1995-12-04 | 1999-02-09 | Scientific-Atlanta, Inc. | Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers |
FI100563B (en) * | 1996-01-30 | 1997-12-31 | Nokia Oy Ab | Encryption of digital presentation objects during transmission and recording |
US6304973B1 (en) * | 1998-08-06 | 2001-10-16 | Cryptek Secure Communications, Llc | Multi-level security network system |
US20020009058A1 (en) * | 2000-04-14 | 2002-01-24 | Frank Kelly | System and method for performing auto-commissioning in a two-way satellite system |
-
2001
- 2001-04-19 FR FR0105318A patent/FR2823936B1/en not_active Expired - Fee Related
-
2002
- 2002-04-18 CN CNA028122666A patent/CN1518824A/en active Pending
- 2002-04-18 WO PCT/FR2002/001337 patent/WO2002087190A1/en active Application Filing
- 2002-04-18 US US10/474,687 patent/US20040128665A1/en not_active Abandoned
- 2002-04-18 KR KR10-2003-7013599A patent/KR20030092083A/en not_active Application Discontinuation
- 2002-04-18 CA CA002444435A patent/CA2444435A1/en not_active Abandoned
- 2002-04-18 JP JP2002584572A patent/JP2004535704A/en active Pending
- 2002-04-18 EP EP20020730365 patent/EP1396135A1/en not_active Withdrawn
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001010095A2 (en) * | 1999-07-30 | 2001-02-08 | Intel Corporation | Protection of communications |
Also Published As
Publication number | Publication date |
---|---|
CA2444435A1 (en) | 2002-10-31 |
KR20030092083A (en) | 2003-12-03 |
US20040128665A1 (en) | 2004-07-01 |
WO2002087190A1 (en) | 2002-10-31 |
JP2004535704A (en) | 2004-11-25 |
FR2823936B1 (en) | 2003-05-30 |
CN1518824A (en) | 2004-08-04 |
FR2823936A1 (en) | 2002-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1396135A1 (en) | Method and system of conditional access to ip services | |
EP0528730B1 (en) | Method for emitting and receiving personalized programs | |
CA2423024C (en) | Telecommunications system, especially ip-type, and equipment for such a system | |
US7092999B2 (en) | Data broadcast network for congestion-free internet access | |
EP2055102B1 (en) | Method of transmitting a complementary datum to a receiving terminal | |
JP4813006B2 (en) | Secure packet-based data broadcasting architecture | |
EP1440550B1 (en) | Methods for multicasting content | |
EP1687975B1 (en) | Secure and personalised distribution of audiovisual flows by means of a hybrid unicast/multicast system | |
WO2001098920A1 (en) | Method and apparatus for distributing video programs using partial caching | |
FR2825222A1 (en) | DEVICE AND METHODS FOR TRANSMITTING AND IMPLEMENTING CONTROL INSTRUCTIONS FOR ACCESSING EXECUTION FUNCTIONALITIES | |
WO2003039153A2 (en) | Controlled-access method and system for transmitting scrambled digital data in a data exchange network | |
FR2835371A1 (en) | METHOD AND DEVICE FOR TRANSMITTING ACCESS TITLE MANAGEMENT MESSAGE | |
HUE032334T2 (en) | Messaging over mobile phone network for digital multimedia network | |
FR2933564A1 (en) | METHOD OF LOCKING AND UNLOCKING FOR THE TRANSPORT OF MPEG2 VIDEO AUDIO DATA FLOW | |
WO2003098870A2 (en) | Method for data distribution with access control | |
WO2004082286A1 (en) | Pay television system, method for transmission of scrambled audiovisual programmes, decoder and chip for carrying out said method | |
EP3248379A1 (en) | Method for broadcasting protected multimedia contents | |
WO2002011443A1 (en) | In-flight encryption/decryption system for data distribution | |
WO2007128922A1 (en) | Methods for broadcasting and receiving scrambled multimedia programmes, terminal and network headend for said methods | |
EP2223524A1 (en) | Method for conditioning and controlling the access to hierarchical coding content, and processor and transmitter for said method | |
FR2877179A1 (en) | Digital data stream e.g. video stream, transmitting method for e.g. remote monitoring field, involves distributing and transmitting indexed packets of stream on two connections between transmitting and receiving equipments | |
FR2889902A1 (en) | METHODS OF TRANSMITTING, ENCODING AND RECEIVING MEDIA DATA PROTECTED BY ENCRYPTION KEYS, SIGNAL, DATA MEDIUM, RESISTANCE DEVICE AND CORRESPONDING PROGRAMS | |
Simpson | Audio and Video over IP Networks and Internet Broadcasting | |
JP2007184873A (en) | Transmission system, transmitter and receiver | |
EP2265013A1 (en) | Transmission of content to a client device comprising at least one decoding module and one security module |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20031009 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: GIRAULT, DAVID Inventor name: FONTAINE, NO(L Inventor name: GOULEAU, EMMANUEL |
|
17Q | First examination report despatched |
Effective date: 20070820 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20091103 |