CA1194212A - Security system for sstv encryption - Google Patents

Security system for sstv encryption

Info

Publication number
CA1194212A
CA1194212A CA000415993A CA415993A CA1194212A CA 1194212 A CA1194212 A CA 1194212A CA 000415993 A CA000415993 A CA 000415993A CA 415993 A CA415993 A CA 415993A CA 1194212 A CA1194212 A CA 1194212A
Authority
CA
Canada
Prior art keywords
signal
sequence
key number
receiver
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
CA000415993A
Other languages
French (fr)
Inventor
Lee Lin-Nan
Russell J. Fang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Comsat Corp
Original Assignee
Comsat Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Comsat Corp filed Critical Comsat Corp
Application granted granted Critical
Publication of CA1194212A publication Critical patent/CA1194212A/en
Expired legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence

Abstract

ABSTRACT OF THE DISCLOSURE
In a secure communications system, a key number which is changed periodically, e.g. monthly, and a ran-dom number from a random number generator are combined and used as a seed to reset a Pn sequence generator, with the output of the generator being used to control encryption of transmission data in a signal processor.
The key is also provided to a first encipherer to en-cipher the random number for transmission with the en-crypted data. At the receiver, the key is provided in common to a deipherer for deiphering the random number and a Pn sequence generator which is periodically reset by the combination of the key and random number in the same manner as in the transmitter. The Pn sequence is then used to decrypt the information. User identifica-tion codes are stored in the transmitter and are used to encipher the key, with each employing its ID code to deipher the key. The user ID codes are known only to the system operator, so that not even a particular user can know the key.

Description

~L~9'~Z~2 The pres~nt invention is related t~ ~he confiden-tiality of television si~nal transmissions, and more particularly to the protection of TV signal trans-missions from unauthorized reception. The environmentin which the present invention may be widely applicable, and in the context of which the invention will be described herein, is that o subscriber television and TV program distribution.
1o Subscriber television systems are becoming increasingly widespread wherein TV signals are sent out via a cable network or over the air and are intended for reception and viewing by only those subscribers who have paid a monthly fee. Wi~h the increase in subscriber television systems has also come an increase in the number of people attempting to receive and display the premium television programs without payment. Thus, there is a need or more sophisticated secuxity techniques for preventing such unauthorized reception.
Many existing subscriber television systems utilize, directly or indirectly, signals transmitted via satellite, and it is becoming c~ite common for non-paying individuals to receive and display the premium television programs via te:levision receive only (TVR0) antennas, thus resulting in a substantial loss of revenue for the distributors of the subscrip-tion televi~ion programs. In addition, various direct satellite broadcast television ~ystems are currently being proposed wherein subscription television programs will be broadcast directly via satellite to , . - . . ..

4~

individual subscriber homes. These subscription satellite television (SSTV~ systems will be quite vulnerable to unau~horized reception/ and an effective security technique is therefore highly desirable.
The purpose of a security subsystem for an SSTV
system is to protect the distributor's business interest and, accordingly, the following objectives should be achieved:
(1) To prevent a non-subscriber from receiYing intelligible video ~nd audio ~ignals by using a regular home television set;
(2) To prevent a delinquent subscriber from receiving intelligible video and audio signals by using the SS~V decoder,
(3) To prevent a legitimate subscriber from xeceiving intelligible video and audio signals of unsubscribed SS~V channels or programs;
(4) To discourage an average technician rom building his own rec~iver ca~able of obt~;ning acceptable ~uality video and audio signals;
(5) To discouragP a small unau~horized business concern from manufacturing and marketing devices which are capable of receivi~g and displaying acceptable ~uality video and audio signals from the SSTV channels; and
(6) To allow a legitimate subscriber to receive and display high quality video and audio signals from the subscxibed chAnn~ls or programs.
It would also be highly desirable tP achieve the above objectives at a reasonable cost.
A number of security systems for CATV exist, most of which involve the suppression or removal o the horizontal sync pulses from the video si~nal before transmission, and the recovery of the sync pulses at the receive end. These techni~ues will prevent people without the sync recovery circuits from receiving and displaying the progXams and may therefore achieve objectives (1) and (6) above, but these security systems do not achieve objectives (2) and (3) and, since sync recovery circuits are relatively easily designed and manuactured, als~ do not satisfy objectives ~4) and (5).
More sophisticated techniques may include additional intelligence in the subscriber's decoder box, including the capability of receiving commands from a control center which are specifically addre~sed to an individual subscriber and are used to turn on or off some or all of ~he channels~ These more sophis-ticated security techniques may succeed in achieving objectives (1)-(3) and (6), but still do not satisfy objectives ~4) and (5). For example, most o~ these ~echniques involve the checking of a password, and a particular channel is turned on only if the password is matched. This could be relati~ely easily by-passed by modifying the subscriber's decoder box or building a separate bo~ with all of the necessary faatures except the on/off switch. Further, subscribers may al~o be able to tamper wikh th~ decoder box to recei~e more programs than are actually paid for.
It is an object oE the present invention to pro-vide a security subsystem for a subsc:ription television system wherein at least some of -the above-mentioned objectives (1)-(6) are achieved.
The present invention provides, in a communications system includi-ng a transmi-tter and a receiver, the -trans-: . mitter including ~ program source for providing a program signal representing program information, a transmit ~;

~L9~

3asignal processor ~or encrypting the program signal in accordance with a transm.it con-trol signal and transmi-t means for transmitting the encryp-ted signal, the re-ceiver including receive means for receiving -the en-crypted signal, a receiver signal processor for decrypt-ing the encrypted signal in accordance with a receive control signal and means for receiving the decrypted signal and providing the program information, the im-provement comprising, first generator means at the trans-mitter for generating a first sequence of signals repre-senting a first sequence of numbers, key number means at the transmitter for providing a key number signal repre-senting a key number, second generator means at -the transmitter for generating a second sequence of signals representing a second sequence oE numbers, the second generator means being periodically reset by a reset sig-nal comprising the output of the first generator means to thereby generate a plurality of sequence segments each beginning with a reset signal, the output of the second generator means comprising the transmit control signal, means at the transmitter for enciphering the first sequence of signals with the key number signal and for providing -the enciphered first signal sequence to the transmit means for transmission wi-th the encrypted program signal, means at the receiver for providing -the key number signal, receive deciphering means at the re-ceiver for receiving the enciphered first signal sequence and the key number, deciphering the first signal sequence in accordance with -the key number and providing the deciphered first signal sequence as an output, and receive generatiny means for genera-ting a sequence of signals representing the first sequence of numbers, the receive generating means being periodically reset by a reset signal comprising the ou-tput of the receive deci-phering means to thereby generate the plurality ofsequence segments, the plurali-ty of sequence segments being provided by the receive generating means to the receive signal processor as the receive control signal.

When the sys-tem is in use it employs crypto-graphic scrambling and descrambling technlzues whiah utili~e a "key" which is changed on a regulax basis and is sent only to paid subscribers, and even this 5 "key" is sent in a different encrypted form to each subscriber so that delinquent subscribers cannnot learn the current key from others.
A record is kept of unique user ID codes corres-ponding to each subscriber, and in a transmitter according to the preferred embodiment of this inven~
tion, the key is ciphered with each subscriber's unique ID code prior to sending the key to that subscriber. A random number generator in the trans-mitter generates a new random number at regular inter~
vals, for example, every second, and this number is combined with ~he key, and the co~bined number is then used as a seed to reset a PN sequence generator every second. This PN sequence generator will thus generate a PN sequence with a random seed in one-second seg~
ments, and the segmented PN seguence is suppli~d to a signal processor where it is used to scramble the audio and video program signals. The random number generator is also ciphered with the key and the en-ciphered random number is continually transmitted with the scrambled video signal.
At the receiver, the enciphered key, which has been sent either via satellite ar mail, is deciphered in the receiver utilizing ~he particular ~ubscriber's unigue ID code, which ID code is internal to the receiver and is unknown to the subscriber. The de-ciphered key is then in turn used to decipher the enciphered random number received with the scrambled program si~nal. The deciphered key and random number are then combined as in the transmitter, and the A~' ~ 2 combined signal is used to continually resek a PN
sequence generator identical to tha-t in the trans-mitter so that a segmented PN sequence will be gener-ated in the receiver which is identical to ~hat s generated in ~he transmitter, and this segmented PN
se~uence can then be used to descramble the received signal. The descrambled signal will then be supplied to the subscriber television set.
BRIEF DESCRIPTION OF ~HE DRAWING
lo The invention will be more clearly understood with reference to ~he following description in con-junction with the accompanying drawing wherein the single figure is a block diagram of the essential components of the SSTV ~ecurity sy~tem embodying the present invention.
DETAILED DESCRIPTION OF T~E PREFERRED EMBODIMENT
The drawing illustrates a functional block dia~
gram of the SSTV security system ~mbodying this invention, The SSTV transmitter will typically in-clude or have access to a billing system computer 10 which will store subscriber information including a list of paid subscribers and their corresponding unique user ID codes. This information may typically be stored in a user data base 12 within the computer.
Also within the computer will be a register 14 or the like cont~;n;ng a key which will be changed on a regular basis, e.g. monkhly. In preparation or sending this "key of the month" to each current sub-scriber, the key is enciphered in cm encipherer 16 with the user ID code unique to that particular cur-rent subscriber, and the enciphered key is then sent -to the subscriber.
The transmitter includes a pseudo-random number (PN) seguence generator 18 and a random number gener-ator 20. The random number generator 20 periodically generates'a new random number, e.g. once every second, 1, and the outputs of the random number generator 20 and key regis~er 14 are combined and loaded into the PN
~equence generato~ 18 to periodically reset or "seed' ~he PN sequence generator 18 in a m~nner well ~nown in the a.rt. Each seeding of th2 seguence generator 18 will begin a new segment of the PN sequence. The program signal from source 22 is supplied to a signal processor 24 where it is encrypted with the se~mented PN sequence from generator 18. The encryption tech nique used may be any one of a variety o~ well known techniguPs and need not be discusse~ in detail herein.
The e~crypted, or ~crambled, signal is then provided to a transmitter 26 for transmission over link 100 to the various subscriber recPivers.
The random number from generator ~0 is enciphered with the key of the month in an encipher~r 28, and ~he enciphered random number is transmitted wi~h the scrambled ~ideo signal over the link 100.
At ~he receiver, a register 30 or the like internal to the subscriber TV receiver contains a subscriber specific secret user ID code which is set priox to installation and is stored in the user data base 12 of the billing computer at the transmitter.
Thus, when the subscriber receiver receives the en~
ciphered key or when the user receives the enciphered key by mail and enters the enciphered key into the receiver, a decipherer 32 in the receiver deciphers the enciphered key with the sec:ret user ID code specific to that particular subscriber, and the deciphered key is provided to a decipherer 34. A
receiver 36 separates the scrambled signal from ~he enciphered random number received.over li~k 100 and provides the enciphered random number to the de-cipherer 34 where it is deciphered with the key - 35 received from the decipherer 32. The deciphered rand~m number and key are then combined and loaded into ~he PN sequence generator 38 to xeset or "seed"
the sequence generator in ~he s~me manner as in the transmitter, to thereby result in the same segmented PN seguence as was used ~or scrambling in the SSTV
transmitter signal processor ~4. This segmented PN
sequence is ~hen provided to signal processor 40 where it is used to descramble ~he received program signal.
The descrambled sig~al is then provided to the sub~criber television ~et 42.
The above-de~cribed security ~ystem provides a no~el technique for g~nera~ing and synchronizing a se~mented pseudo-random number ~PN3 seguence, and a secure key distribution method. The se~mented PN
seguence generated is used to contro~ the video and audio signal processors that scramble and descramble the program signals. Since a different se~mented PN
sequence will b~ generated by each distinct key, the scrambling sequence is diferent for each key, and by periodically changing th2 key the scrambling and descrambling sequences will change. Thus, it i~ not possible for anyone wi~hout exact knowledge of the current key to descramble the received program signal with or wi~hout a descrambling de~ice.
For each given duration of time, a particular chAnnel is scrambled by a PN se~uence that is generated by a randomly selected number and the key of the month. To prevent subscribexs of different chAnnels from exchanging the keys ~nong ~hemselves, it is essential that the key for a given ch~nnel distri-buted to each subscriber look different, and thi~
accomplished by enciphering the key with each subscriber's unique user ID code. In ~his way, although a single key is provided by the regi~ter 14 at any one time, a di~erent key is required by each subscriber. It is only when the subscriber-specific ~ 9 ~

key is entered into the receiver that the true key of the mon~h contained in reqister 14 can be provided to the decipherer 34 and seguence generator 38, and ~he deciphering sf ~his true key of the month in the decipherer 32 i~ performed internally of the subscriber receiver and without the subscriber's knowledge.
An impor~ant feature o any security system is that a legitimate subscriber mus-t be capa`ble of 10 obt~in;ng synchronization within a shor~ period of time. In the system according to the present invention, the PN seguence used for scxambling and descr~mbling the siynal in si~nal processor~ 24 and 40, respectively, is separated into short segments each of which is seeded by ~he combination o~ khe key of the month and a random number which changes, for example, once every second. Thus, assuming ~hat a legitimate subscriber does have his appropriate key, the time required to acquire synchronization will be substantially equal to the du:ration o:f each random number so that synchronization can be acquired rapidly : in case of loss of sync due to power outages, rainstorms, changing of channels, e~c.
The individuial components in ~he security system according to the present invention are known in the art and need not be described in detail herein since the internal details of ~hese cc,mponents do not constitute a part of the present i~vention. The encipherers u~ed to encipher the key of the month and 3~ ~he random number can be two different encipherers, but for the sake of hardware simplicity at the receive side, and conseguent cost savings in mass production of the subscriber receivers, it is preferable that the same enciphPrers be used~ The encipherer may employ any enciphering method as long as it has a suffi-ciently high level of security.

~ ' > ~1 ' ' g The PN sequence generator can be any general PN
sequence generator as long as it also has sufficient security strengt~, e.g. a proper~y selected non-linear ~eedback shit register may suffice.
The random number ge~erator in the transmitter may be a well known thermal noi~e generator which generate~ "true" random number~, or it may be a pseudo-random number generator similar to the seguence generator 18, implemented in a well known manner with digital electronics or computer sof~ware. Similarly, ~he technique for combining ~he key of the month and the random number generator to produc2 the "seed" for the PN sequence generators 18 and 38 is not ~ritical, with the simplest technique being a bik by-bit modulo-2 addition of th~ two num~ers.
In general, each of the functional blocks in the drawing can be implemented with existing techniques, with system complexity and cost and security st~eng~h depending on the particular implementation of each of the functional blocks.
The transformation of th simple cipherer is specified by a variable which is different for each ~h~nnel or special pxogram, and is changed every month.
The user ID code 30 within each subscriber set may be a set of binary switches or a bit pattern programmed into a read-only memory in a sealed box to prevent the subscriber from seeing or changing the number.
The use of a simple cipherer in addition to the non-linear feedback shift-register may seem to increase the system complexity unnecesarily. However, since only a small amou~t of data, namely the "seed", need be handled each time, and since the statistical properties of the cipherer do not impact to the output of the PN sequence yenerator, ~he cipherer can be very simple. One possible approach, for ex~mple, is a ROM
table of random bits with or without cipher feedback.
The use of this simple cipherer greatly simplifies the problem of cryptosynchronization and key distribution, and therefore reduces the overall system complexity.
Suitable alternatives for the scramblin~ of the program signals includP conven~ional scrambling techniques such as on-off switching, r~n~o~ly invert-ing lines, fields or frames, and delaying horizontal lines or fields by certain randomly fixed steps. In any case, ~he technigue used will require the genera-tion of a PN sequence which must be synchroni~ed at both the transmit and receive sides.

Claims (13)

WHAT IS CLAIMED IS:
1. In a communications system including a transmitter and a receiver, said transmitter including a program source for providing a program signal repre-senting program information, a transmit signal processor for encrypting said program signal in accordance with a transmit control signal and transmit means for transmitting said encrypted signal, said receiver including receive means for receiving said encrypted signal, a receiver signal processor for decrypting said encrypted signal in accordance with a receive control signal and means for receiving said decrypted signal and providing said program informa-tion, the improvement comprising:
first generator means at said transmitter for generating a first sequence of signals repre-senting a first sequence of numbers;
key number means at said transmitter for providing a key number signal representing a key number;
second generator means at said transmitter for generating a second sequence of signals representing a second sequence of numbers, said second generator means being periodically reset by a reset signal comprising the output of said first generator means to thereby generate a plurality of sequence segments each beginning with a reset signal, the output of said second generator means comprising said transmit control signal;
means at said transmitter for enciphering said first sequence of signals with said key number signal and for providing said enciphered first signal sequence to said transmit means for transmission with said encrypted program signal;

means at said receiver for providing said key number signal;
receive deciphering means at said receiver for receiving said enciphered first signal sequence and said key number, deciphering said first signal sequence in accordance with said key number and providing said deciphered first signal sequence as an output; and receive generating means for generating a sequence of signals representing said first sequence of numbers, said receive generating means being periodically reset by a reset signal comprising the output of said receive deciphering means to thereby generate said plurality of sequence segments, said plurality of sequence segments being provided by said receive generating means to said receive signal processor as said receive control signal.
2. A communications system as defined in claim 1, further comprising:
means for providing an identification number signal uniquely identifying said receiver;
means for enciphering said key number signal with said identification signal;
means at said receiver for providing said identification number signal; and means at said receiver for receiving said identification number signal and said enciphered key number signal and for deciphering said key number signal, said deciphered key number signal being provided to said receive deciphering means.
3. A communications system as defined in claim 1, wherein each of said reset signals provided to said second generator means comprises a combination of said key number signal and a signal of said first signal sequence, and wherein each of said reset signals provided to said receive generator means comprises a combination of said key number signal and a signal of said deciphered first signal sequence.
4. A communications system as defined in claim 3, wherein said key number signal is changed at predetermined time intervals.
5. A communications system as defined in claim 4, wherein said second generator means is a non-linear pseudorandom sequence generator.
6. A communications system as defined in claim 3, wherein a plurality of receivers receive the encrypted signal transmitted by said transmitter, each of said receivers having a corresponding unique identification number and said enciphered key number received at each receiver being enciphered with the user identification number unique to said each receiver.
7. The communications system as defined in claim 6, wherein said first signal sequence represents a substantially random number sequence.
8. In a method of providing security in a signal transmission system, said method including the steps of encrypting in accordance with an encryption control signal a program signal representing informa-tion, transmitting said encrypted signal, receiving said encrypted signal, decrypting said received encrypted signal in accordance with a decryption control signal and providing said information repre-sented by said decrypted signal the improvement comprising:
generating a key number signal representing a key number;
generating a first signal sequence repre-senting a first sequence of numbers;
generating a second signal sequence repre-senting a second sequence of numbers, said second signal sequence being periodically reset by a reset signal comprising a signal of said first signal sequence to thereby generate a plurality of second sequence segments;
providing said second sequence segments to said transmit signal processor as said encryption control signal;
enciphering said first signal sequence with said key number and providing said enciphered first sequence to said transmitter for transmission with said encrypted signal;
decrypting said enciphered first sequence at said receiver in accordance with said key number signal;
generating said second sequence segments at said receiver by resetting a receive number signal generator with a reset signal comprising said deciphered first signal sequence; and providing said second sequence segments to said receive signal processor as said decryption control signal.
9. A method as defined in claim 8, further comprising:
enciphering said key number signal at said transmitter with a user identification number signal uniquely identifying said receiver;
transmitting said enciphered key number signal to said receiver;
deciphering said enciphered key number signal at said receiver in accordance with said user identification number signal uniquely identifying said receiver; and providing said deciphered key number signal to said deciphering means.
10. The method as defined in claim 9, further comprising the steps of:

combining said key number signal and a signal in said first sequence to obtain said reset signal in said transmitter; and combining said key number signal and a signal in said deciphered first sequence in order to obtain said reset signal in said receiver.
11. The method as defined in claim 8, further comprising the step of periodically changing said key number signal.
12. The method as defined in claim 11, wherein said second generator means in said transmitter and said generator means in said receiver each generate non-linear pseudo-random signal sequences.
13. The method as defined in claim 12, wherein said first signal sequence represents a substantially random number sequence.
CA000415993A 1981-11-19 1982-11-19 Security system for sstv encryption Expired CA1194212A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US06/322,833 US4484027A (en) 1981-11-19 1981-11-19 Security system for SSTV encryption
US322,833 1981-11-19

Publications (1)

Publication Number Publication Date
CA1194212A true CA1194212A (en) 1985-09-24

Family

ID=23256635

Family Applications (2)

Application Number Title Priority Date Filing Date
CA000415993A Expired CA1194212A (en) 1981-11-19 1982-11-19 Security system for sstv encryption
CA613072A Expired - Lifetime CA1328501B (en) 1981-11-19 1982-11-19 Security System for SSTV Encryption

Family Applications After (1)

Application Number Title Priority Date Filing Date
CA613072A Expired - Lifetime CA1328501B (en) 1981-11-19 1982-11-19 Security System for SSTV Encryption

Country Status (7)

Country Link
US (1) US4484027A (en)
EP (1) EP0094423B1 (en)
JP (2) JPS58501982A (en)
AT (1) ATE56333T1 (en)
CA (2) CA1194212A (en)
DE (1) DE3280237D1 (en)
WO (1) WO1983001881A1 (en)

Families Citing this family (120)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4965825A (en) 1981-11-03 1990-10-23 The Personalized Mass Media Corporation Signal processing apparatus and methods
US7831204B1 (en) 1981-11-03 2010-11-09 Personalized Media Communications, Llc Signal processing apparatus and methods
USRE47642E1 (en) 1981-11-03 2019-10-08 Personalized Media Communications LLC Signal processing apparatus and methods
USRE33189E (en) * 1981-11-19 1990-03-27 Communications Satellite Corporation Security system for SSTV encryption
US4658292A (en) * 1982-04-30 1987-04-14 Nec Corporation Enciphering key distribution system for subscription TV broadcast or catv system
ATE15964T1 (en) * 1982-04-30 1985-10-15 British Telecomm RADIO TRANSMISSION OF ENCRYPTED SIGNALS.
US5500899A (en) * 1982-05-20 1996-03-19 The United States Of America As Represented By The Director, Nsa Secure voice conferencing apparatus
US4531020A (en) * 1982-07-23 1985-07-23 Oak Industries Inc. Multi-layer encryption system for the broadcast of encrypted information
US4811394A (en) * 1982-07-28 1989-03-07 Communications Satellite Corporation Variable starting state scrambling circuit
US4757468A (en) * 1982-09-22 1988-07-12 Intel Corporation Authenticated read-only memory
DE3371947D1 (en) * 1982-12-20 1987-07-09 Radiotechnique Sa Generator of random number sequences
GB2140656A (en) * 1983-05-13 1984-11-28 Philips Electronic Associated Television transmission system
US4613901A (en) * 1983-05-27 1986-09-23 M/A-Com Linkabit, Inc. Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals
GB2141905A (en) * 1983-06-20 1985-01-03 Philips Electronic Associated Secure transmission system
EP0129299A3 (en) * 1983-06-20 1986-03-19 Philips Electronics Uk Limited Secure television transmission system
US4736422A (en) * 1983-06-30 1988-04-05 Independent Broadcasting Authority Encrypted broadcast television system
CA1213972A (en) * 1983-07-13 1986-11-12 Takashi Okada Apparatus for scrambling a television signal
CA1219930A (en) * 1983-07-21 1987-03-31 Takashi Kamitake Information transmission system
US4802215A (en) * 1983-07-22 1989-01-31 Independent Broadcasting Authority Security system for television signal encryption
US4682360A (en) * 1983-12-22 1987-07-21 Frederiksen Jeffrey E Video transmission system
US4799258A (en) * 1984-02-13 1989-01-17 National Research Development Corporation Apparatus and methods for granting access to computers
AU559311B2 (en) * 1984-02-15 1987-03-05 Matsushita Electric Industrial Co., Ltd. Pay tv charge/time data display
US4819267A (en) * 1984-02-22 1989-04-04 Thumbscan, Inc. Solid state key for controlling access to computer systems and to computer software and/or for secure communications
US4634808A (en) * 1984-03-15 1987-01-06 M/A-Com Government Systems, Inc. Descrambler subscriber key production system utilizing key seeds stored in descrambler
JPS60210044A (en) * 1984-04-03 1985-10-22 Nec Corp Transmitting and receiving device of error correction code
FR2563402B1 (en) * 1984-04-19 1987-08-28 Loire Electronique ENCODING AND DECODING METHOD FOR A TOLL TELEVISION SYSTEM
US4712238A (en) * 1984-06-08 1987-12-08 M/A-Com Government Systems, Inc. Selective-subscription descrambling
US4751732A (en) * 1984-07-06 1988-06-14 Kabushiki Kaisha Toshiba Broadcasting system
JPS6120442A (en) * 1984-07-09 1986-01-29 Toshiba Corp Chargeable broadcasting system
US4742544A (en) * 1984-07-09 1988-05-03 Kupnicki Richard A Television transmission network with scrambling and descrambling
DE3428698A1 (en) * 1984-08-03 1986-02-13 Philips Patentverwaltung Gmbh, 2000 Hamburg CIRCUIT ARRANGEMENT FOR A DEVICE WITH AN IMAGE AND / OR SOUND SIGNAL CHANNEL
US4747139A (en) * 1984-08-27 1988-05-24 Taaffe James L Software security method and systems
US4829569A (en) * 1984-09-21 1989-05-09 Scientific-Atlanta, Inc. Communication of individual messages to subscribers in a subscription television system
US4885775A (en) * 1984-09-21 1989-12-05 Scientific-Atlanta, Inc. Information display scheme for subscribers of a subscription television system
US4908834A (en) * 1984-10-12 1990-03-13 Wiedemer John D High security pay television system
US4907273A (en) * 1984-10-12 1990-03-06 Wiedemer John D High security pay television system
US4696034A (en) * 1984-10-12 1987-09-22 Signal Security Technologies High security pay television system
US4905280A (en) * 1984-10-12 1990-02-27 Wiedemer John D High security videotext and videogame system
US4887296A (en) * 1984-10-26 1989-12-12 Ricoh Co., Ltd. Cryptographic system for direct broadcast satellite system
JPS61108272A (en) * 1984-11-01 1986-05-26 Toshiba Corp Chargeable broadcast system
US5036537A (en) * 1984-11-19 1991-07-30 General Instrument Corp. Geographic black-out method for direct broadcast satellite system
SE8406489L (en) * 1984-12-19 1986-06-20 Nordspace Ab television reception
US4709266A (en) * 1985-01-14 1987-11-24 Oak Industries Inc. Satellite scrambling communication network using geographically separated uplinks
US4803725A (en) * 1985-03-11 1989-02-07 General Instrument Corp. Cryptographic system using interchangeable key blocks and selectable key fragments
US4694491A (en) * 1985-03-11 1987-09-15 General Instrument Corp. Cryptographic system using interchangeable key blocks and selectable key fragments
DE3518462A1 (en) * 1985-05-23 1986-11-27 Standard Elektrik Lorenz Ag, 7000 Stuttgart ENCRYPTED MESSAGE TRANSMISSION SYSTEM
ZA862839B (en) * 1985-05-24 1986-12-30 Scientific Atlanta Method and apparatus for scrambling and descrambling television signals
US4802217A (en) * 1985-06-07 1989-01-31 Siemens Corporate Research & Support, Inc. Method and apparatus for securing access to a computer facility
GB2183378A (en) * 1985-11-25 1987-06-03 Philips Electronic Associated Receiving scrambled signals
EP0253885A4 (en) * 1985-12-26 1991-03-20 Gordian Systems Solid state key for controlling access to computer systems and to computer software and/or for secure communications
US4688250A (en) * 1986-01-29 1987-08-18 Rca Corporation Apparatus and method for effecting a key change via a cryptographically protected link
US4890321A (en) * 1986-07-08 1989-12-26 Scientific Atlanta, Inc. Communications format for a subscription television system permitting transmission of individual text messages to subscribers
US5261070A (en) * 1986-07-24 1993-11-09 Meiji Milk Product Co., Ltd. Method and apparatus for forming unique user identification data at remote terminal for secure transmission of data from host terminal
US4792972A (en) * 1986-08-19 1988-12-20 Scientific-Atlanta, Inc. Remote programming of CATV channel authorization unit
US4893339A (en) * 1986-09-03 1990-01-09 Motorola, Inc. Secure communication system
US4827514A (en) * 1986-09-03 1989-05-02 Motorola, Inc. Method and apparatus to detect and recover a pseudo-random sequence
US4797672A (en) * 1986-09-04 1989-01-10 Octel Communications Corp. Voice network security system
US4805216A (en) * 1987-01-08 1989-02-14 Compfax Corporation Method and apparatus for continuously acknowledged link encrypting
US4870682A (en) * 1987-02-25 1989-09-26 Household Data Services (Hds) Television scrambling system
US4807286A (en) * 1987-04-22 1989-02-21 Wiedemer John D High security pay television system
IL83549A (en) * 1987-08-16 1992-08-18 Yossi Matias Video scrambling apparatus and method based on space filling curves
FR2631193B1 (en) * 1988-05-06 1994-09-16 Europ Rech Electr Lab METHOD FOR SCRAMBLING AND SCALING-UP OF COMPOSITE VIDEO SIGNALS, AND IMPLEMENTING DEVICE
IT1217755B (en) * 1988-06-01 1990-03-30 Sits Soc It Telecom Siemens ENCRYPTION AND DECIFRATION DEVICE FOR HIGH SPEED TRANSMISSION SYSTEMS,
US5208856A (en) * 1988-12-23 1993-05-04 Laboratoire Europeen De Recherches Electroniques Avancees Scrambling and unscrambling method for composite video signals and implementing device
FR2643529B1 (en) * 1989-02-22 1991-06-07 Kudelski Sa Fabr Enregistr Nag PAID TELEVISION SYSTEM USING A MEMORY CARD ASSOCIATED WITH A DECODER
GB2231755B (en) * 1989-04-21 1993-10-06 Pioneer Electronic Corp Method for scrambling a television signal and method and apparatus for descrambling a scrambled television signal
US5113440A (en) * 1989-07-21 1992-05-12 Oci Communcations, Inc. Universal decoder
US5237610A (en) * 1990-02-01 1993-08-17 Scientific-Atlanta, Inc. Independent external security module for a digitally upgradeable television signal decoder
US5029207A (en) * 1990-02-01 1991-07-02 Scientific-Atlanta, Inc. External security module for a television signal decoder
US5235643A (en) * 1991-05-21 1993-08-10 Anderson Steven E Satellite receiver retuning system
JP2622049B2 (en) * 1991-05-24 1997-06-18 松下電器産業株式会社 Cable broadcasting system
US5208853A (en) * 1991-09-09 1993-05-04 Motorola, Inc. Method and apparatus for usage protection of data files using split key and unique variable
US5179591A (en) * 1991-10-16 1993-01-12 Motorola, Inc. Method for algorithm independent cryptographic key management
US5230020A (en) * 1991-10-16 1993-07-20 Motorola, Inc. Algorithm independent cryptographic key management
US5272752A (en) * 1992-03-16 1993-12-21 Scientific-Atlanta, Inc. Authorization code lockout mechanism for preventing unauthorized reception of transmitted data
JP3010930B2 (en) * 1992-09-24 2000-02-21 松下電器産業株式会社 Recording and playback device
JPH06266670A (en) * 1993-03-11 1994-09-22 Fujitsu Ltd Ciphering virtual terminal initialization device
ATE252796T1 (en) * 1993-07-20 2003-11-15 Canon Kk METHOD AND COMMUNICATIONS SYSTEM USING AN ENCRYPTION DEVICE
WO1995026086A1 (en) * 1994-03-18 1995-09-28 Thomson Consumer Electronics, Inc. Data decryption apparatus in a subscription television signal receiving system
FI97184C (en) * 1994-11-07 1996-10-25 Nokia Telecommunications Oy Method and apparatus for performing subscriber-specific editing and remodeling in a subscriber network
US5555308A (en) * 1994-11-10 1996-09-10 Angelika R. Levien Encryption of signals to insure viewership of commercials
FR2730372A1 (en) * 1995-02-08 1996-08-09 Philips Electronics Nv PAY TELEVISION METHOD
JP3294739B2 (en) * 1995-03-30 2002-06-24 三洋電機株式会社 Method for scrambling or descrambling FM multiplex broadcasting
US5608723A (en) * 1995-04-26 1997-03-04 Interval Research Corporation Methods and systems for secure wireless communication within a predetermined boundary
US5774549A (en) 1995-12-04 1998-06-30 Sun Microsystems, Inc. Method and apparatus that processes a video signal to generate a random number generator seed
US6289314B1 (en) * 1996-09-18 2001-09-11 Matsushita Electric Industrial Co., Ltd. Pay information providing system for descrambling information from plural sources and rescrambling the information before sending to a terminal or terminals
JPH10301492A (en) 1997-04-23 1998-11-13 Sony Corp Enciphering device and method therefor, decoding device and method therefor, and information processing device and method therefor
WO1999004530A1 (en) * 1997-07-15 1999-01-28 V-One Corporation File encryption with key recovery
US6510228B2 (en) 1997-09-22 2003-01-21 Qualcomm, Incorporated Method and apparatus for generating encryption stream ciphers
US6252958B1 (en) 1997-09-22 2001-06-26 Qualcomm Incorporated Method and apparatus for generating encryption stream ciphers
IL123554A (en) 1998-03-04 2003-01-12 Nds Ltd Key delivery in a secure broadcasting system
TW412909B (en) * 1998-05-07 2000-11-21 Kudelski Sa Mechanism of matching between a receiver and a security module
US6490357B1 (en) * 1998-08-28 2002-12-03 Qualcomm Incorporated Method and apparatus for generating encryption stream ciphers
US6560338B1 (en) 1998-08-28 2003-05-06 Qualcomm Incorporated Limiting delays associated with the generation of encryption stream ciphers
KR20020019581A (en) * 1999-08-03 2002-03-12 마이클 알. 쿠리 System and method for secured data transmission within a wireless communication system
US7170996B1 (en) * 1999-10-18 2007-01-30 Qualcomm Incorporated Random number generation for encrypting cellular communications
WO2001041357A1 (en) * 1999-12-03 2001-06-07 Cipheractive Communication Security Ltd. Encryption of partitioned data blocks utilizing public key methods and random numbers
US7397918B2 (en) 2000-05-22 2008-07-08 Nds Limited Dynamically shifting control word
US6772434B1 (en) * 2000-05-24 2004-08-03 The Directv Group, Inc. Device and method for the integrated presentation of a secondary service as a part of a primary service
EP1350153B1 (en) * 2000-12-15 2012-07-11 Polycom, Inc. System and method for device co-location discrimination
US9100457B2 (en) 2001-03-28 2015-08-04 Qualcomm Incorporated Method and apparatus for transmission framing in a wireless communication system
TW566024B (en) 2001-07-30 2003-12-11 Nagravision Sa Method to create a virtual private network through a public network
US7352868B2 (en) 2001-10-09 2008-04-01 Philip Hawkes Method and apparatus for security in a data processing system
US7649829B2 (en) 2001-10-12 2010-01-19 Qualcomm Incorporated Method and system for reduction of decoding complexity in a communication system
US20030112978A1 (en) * 2001-12-17 2003-06-19 Jeffrey Rodman System and method for secured data transmission within a wireless communication system
US7477743B2 (en) * 2002-02-07 2009-01-13 Nokia Corporation Hybrid network encrypt/decrypt scheme
US7599655B2 (en) 2003-01-02 2009-10-06 Qualcomm Incorporated Method and apparatus for broadcast services in a communication system
US7346160B2 (en) * 2003-04-23 2008-03-18 Michaelsen David L Randomization-based encryption apparatus and method
US7925013B1 (en) 2003-06-30 2011-04-12 Conexant Systems, Inc. System for data encryption and decryption of digital data entering and leaving memory
US8718279B2 (en) 2003-07-08 2014-05-06 Qualcomm Incorporated Apparatus and method for a secure broadcast system
US8229108B2 (en) * 2003-08-15 2012-07-24 Broadcom Corporation Pseudo-random number generation based on periodic sampling of one or more linear feedback shift registers
US7308100B2 (en) * 2003-08-18 2007-12-11 Qualcomm Incorporated Method and apparatus for time-based charging for broadcast-multicast services (BCMCS) in a wireless communication system
US8724803B2 (en) 2003-09-02 2014-05-13 Qualcomm Incorporated Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system
KR100617671B1 (en) * 2003-12-22 2006-08-28 삼성전자주식회사 High-speed wireless lan system
US20060126841A1 (en) * 2004-12-14 2006-06-15 Tata Consultancy Services Ltd. Method and apparatus for a security system for wireless networks
US20090210695A1 (en) * 2005-01-06 2009-08-20 Amir Shahindoust System and method for securely communicating electronic documents to an associated document processing device
US7502466B2 (en) * 2005-01-06 2009-03-10 Toshiba Corporation System and method for secure communication of electronic documents
US7406120B1 (en) * 2005-04-01 2008-07-29 Bae Systems Information And Electronic Systems Integration Inc. Transmission channel impulse response estimation using fast algorithms
JP2008270870A (en) * 2007-04-16 2008-11-06 Sony Corp Communications system, communications apparatus and method, and computer program
JP2009188751A (en) * 2008-02-06 2009-08-20 Fujitsu Ltd Encryption and decryption method, transmission device, and reception device in radio communication system

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL6906145A (en) * 1968-05-15 1969-11-18
US3649915A (en) * 1970-06-22 1972-03-14 Bell Telephone Labor Inc Digital data scrambler-descrambler apparatus for improved error performance
US3801732A (en) * 1971-11-22 1974-04-02 J Reeves Method and apparatus for scrambled television
US3914534A (en) * 1973-10-29 1975-10-21 Magnavox Co Methods and apparatus for scrambling and unscrambling premium television channels
US3911216A (en) * 1973-12-17 1975-10-07 Honeywell Inf Systems Nonlinear code generator and decoder for transmitting data securely
JPS5831762B2 (en) * 1974-08-21 1983-07-08 横河電機株式会社 Random Shingo Hatsusei Cairo
FR2313825A1 (en) * 1975-06-06 1976-12-31 Telediffusion Fse DATA DISSEMINATION SYSTEM
US4115662A (en) * 1975-06-06 1978-09-19 Etablissement Public Dit Telediffusion De France One way data transmission system
US4081832A (en) * 1976-06-08 1978-03-28 Pay Television Corporation Pay television system, method and apparatus
US4115807A (en) * 1976-07-19 1978-09-19 Pires H George Telephone billing apparatus for a subscription television system
US4163254A (en) * 1977-02-14 1979-07-31 Block Robert S Method and system for subscription television billing and access
US4200770A (en) * 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
US4310720A (en) * 1978-03-31 1982-01-12 Pitney Bowes Inc. Computer accessing system
FR2448825A1 (en) * 1979-02-06 1980-09-05 Telediffusion Fse SYSTEM FOR TRANSMITTING INFORMATION BETWEEN A TRANSMISSION CENTER AND RECEIVING STATIONS, WHICH IS PROVIDED WITH A MEANS OF CONTROLLING ACCESS TO THE INFORMATION TRANSMITTED
FR2448824A1 (en) * 1979-02-06 1980-09-05 Telediffusion Fse VIDEOTEX SYSTEM PROVIDED WITH INFORMATION ACCESS CONTROL MEANS
US4365110A (en) * 1979-06-05 1982-12-21 Communications Satellite Corporation Multiple-destinational cryptosystem for broadcast networks
FR2459595A1 (en) * 1979-06-15 1981-01-09 Telediffusion Fse ACCESS CONTROL TELEVISION SYSTEM USING A VARIABLE ELECTRONIC KEY
JPS5612185A (en) * 1979-07-11 1981-02-06 Clarion Co Ltd Chargeable television system of independent synchronizing type on radio system
JPS5639685A (en) * 1979-09-07 1981-04-15 Clarion Co Ltd Decoding system
US4292650A (en) * 1979-10-29 1981-09-29 Zenith Radio Corporation Stv Subscriber address system
JPS5843743B2 (en) * 1979-12-25 1983-09-28 富士通株式会社 Encryption method
JPS6035865B2 (en) * 1979-12-27 1985-08-16 株式会社東芝 Data transmission method
US4388643A (en) * 1981-04-06 1983-06-14 Northern Telecom Limited Method of controlling scrambling and unscrambling in a pay TV system

Also Published As

Publication number Publication date
JPS58501982A (en) 1983-11-17
JPH06125554A (en) 1994-05-06
CA1328501E (en) 1985-09-24
US4484027A (en) 1984-11-20
EP0094423B1 (en) 1990-09-05
EP0094423A1 (en) 1983-11-23
WO1983001881A1 (en) 1983-05-26
CA1328501B (en) 1994-04-12
DE3280237D1 (en) 1990-10-11
EP0094423A4 (en) 1986-11-27
ATE56333T1 (en) 1990-09-15

Similar Documents

Publication Publication Date Title
CA1194212A (en) Security system for sstv encryption
USRE33189E (en) Security system for SSTV encryption
EP0194769B1 (en) Cryptographic system for a direct broadcast by satellite network
US4887296A (en) Cryptographic system for direct broadcast satellite system
US5341425A (en) Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a reception site
US5590200A (en) Apparatus and method for securing communication systems
CA2055132C (en) Apparatus and method for upgrading terminals to maintain a secure communication network
CN100499799C (en) Transmission system of supplying conditional access for transmitted data
US4736422A (en) Encrypted broadcast television system
EP0179612B1 (en) Cryptographic system for direct broadcast satellite network
Lee Key distribution and management for conditional access system on DBS
JPS62503066A (en) Method and apparatus for scrambling and descrambling television signals
US5206906A (en) Video scrambling system
CN101119170A (en) Frequency modulated subcarrier based user management method
GB2297017A (en) Encryption of television services
CA1315388C (en) Cryptographic system using interchangeable key blocks and selectable key fragments
JPH0345944B2 (en)

Legal Events

Date Code Title Description
MZSU Surrender
MZSU Surrender

Effective date: 19940412