US20020037081A1 - Cryptographic key distribution system and method for digital video systems - Google Patents

Cryptographic key distribution system and method for digital video systems Download PDF

Info

Publication number
US20020037081A1
US20020037081A1 US09/991,081 US99108101A US2002037081A1 US 20020037081 A1 US20020037081 A1 US 20020037081A1 US 99108101 A US99108101 A US 99108101A US 2002037081 A1 US2002037081 A1 US 2002037081A1
Authority
US
United States
Prior art keywords
cryptographic key
encrypted
key
data
cryptographic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/991,081
Inventor
David Rogoff
Steven Petilli
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Avago Technologies International Sales Pte Ltd
Original Assignee
Broadcom Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/844,898 external-priority patent/US20020003878A1/en
Priority to US09/991,081 priority Critical patent/US20020037081A1/en
Application filed by Broadcom Corp filed Critical Broadcom Corp
Assigned to BROADCOM CORPORATION reassignment BROADCOM CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ROGOFF, DAVID, PETILLI, STEVEN
Publication of US20020037081A1 publication Critical patent/US20020037081A1/en
Assigned to JPMORGAN CHASE BANK, AS COLLATERAL AGENT reassignment JPMORGAN CHASE BANK, AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: SEAGATE TECHNOLOGY LLC
Priority to EP02090377A priority patent/EP1326447A1/en
Assigned to SEAGATE TECHNOLOGY LLC reassignment SEAGATE TECHNOLOGY LLC RELEASE OF SECURITY INTERESTS IN PATENT RIGHTS Assignors: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT (FORMERLY KNOWN AS THE CHASE MANHATTAN BANK AND JPMORGAN CHASE BANK)
Priority to US11/593,872 priority patent/US7945047B2/en
Assigned to BANK OF AMERICA, N.A., AS COLLATERAL AGENT reassignment BANK OF AMERICA, N.A., AS COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: BROADCOM CORPORATION
Assigned to AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD. reassignment AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BROADCOM CORPORATION
Assigned to BROADCOM CORPORATION reassignment BROADCOM CORPORATION TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS Assignors: BANK OF AMERICA, N.A., AS COLLATERAL AGENT
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/4104Peripherals receiving signals from specially adapted client devices
    • H04N21/4122Peripherals receiving signals from specially adapted client devices additional display device, e.g. video projector
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00224Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a remote server
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00231Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local external medium, e.g. a card
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00485Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
    • G11B20/00492Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
    • G11B20/00507Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein consecutive physical data units of the record carrier are encrypted with separate encryption keys, e.g. the key changes on a cluster or sector basis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/426Internal components of the client ; Characteristics thereof
    • H04N21/42646Internal components of the client ; Characteristics thereof for reading from or writing on a non-volatile solid state storage medium, e.g. DVD, CD-ROM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/4508Management of client data or end-user data
    • H04N21/4516Management of client data or end-user data involving client characteristics, e.g. Set-Top-Box type, software version or amount of memory available
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/454Content or additional data filtering, e.g. blocking advertisements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/637Control signals issued by the client directed to the server or network components
    • H04N21/6377Control signals issued by the client directed to the server or network components directed to server
    • H04N21/63775Control signals issued by the client directed to the server or network components directed to server for uploading keys, e.g. for a client to communicate its public key to the server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/165Centralised control of user terminal ; Registering at central
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91357Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
    • H04N2005/91364Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/84Television signal recording using optical recording
    • H04N5/85Television signal recording using optical recording on discs or drums

Definitions

  • the present invention relates to a system and method for distributing cryptographic keys to digital data encryption and decryption devices, and particularly to the distribution of cryptographic keys for digital video and/or multimedia systems.
  • DVDs containing high definition video images of motion pictures may not be available for sale unless the data on the DVDs can be protected from copying, both while on the disk and during its routing to a display device. Therefore, before consumer type DVD players with digital video outputs are available for sale, the content producers and DVD player manufacturers preferably should agree on a secure way of sending digital video data from the DVD players to video display monitors or televisions.
  • the digital video data is typically in parallel format and is converted to serial format (for digital video output) by a digital transmitter before being sent out on a digital display link to a video monitor or a television.
  • serial format for digital video output
  • a digital receiver converts the serial data back into parallel format.
  • the digital signal on the display link cable if not protected, e.g., via encryption, can be intercepted and copied by a person wanting to steal the digital video data.
  • DVI Digital Visual Interface
  • HDCP High-bandwidth Digital Content Protection
  • a system for distributing a cryptographic key for encrypting digital data comprises a key source and a transmitter.
  • the key source is used for storing the cryptographic key, encrypting the cryptographic key, and for transmitting the encrypted cryptographic key over a control bus.
  • the transmitter is used for receiving the digital data, receiving the encrypted cryptographic key over the control bus, decrypting the encrypted cryptographic key to recover the cryptographic key, encrypting the digital data using the cryptographic key to generate encrypted data, and for transmitting the encrypted data.
  • a system for distributing a cryptographic key for decrypting encrypted data comprises a key source and a receiver.
  • the key source is used for storing the cryptographic key, encrypting the cryptographic key, and for transmitting the encrypted cryptographic key over a control bus.
  • the receiver is used for receiving the encrypted data, receiving the encrypted cryptographic key over the control bus, decrypting the encrypted cryptographic key to recover the cryptographic key, decrypting the encrypted data using the cryptographic key to generate digital data, and for transmitting the digital data.
  • a method of distributing a cryptographic key for encrypting digital data is provided.
  • the cryptographic key is stored in a key source, and then encrypted to generate an encrypted cryptographic key.
  • the encrypted cryptographic key is transmitted from the key source over a control bus, and loaded into a transmitter from the control bus.
  • the encrypted cryptographic key is decrypted in the transmitter to recover the cryptographic key.
  • the digital data is introduced into the transmitter, and encrypted using the recovered cryptographic key to generate encrypted data, which is transmitted from the transmitter.
  • a method of distributing a cryptographic key for decrypting encrypted data is provided.
  • the cryptographic key is stored in a key source, and then encrypted to generate an encrypted cryptographic key.
  • the encrypted cryptographic key is transmitted from the key source over a control bus, and loaded into a receiver from the control bus.
  • the encrypted cryptographic key is decrypted in the receiver to recover the cryptographic key.
  • the encrypted data is introduced into the receiver, and decrypted using the recovered cryptographic key to generate decrypted data, which is transmitted from the receiver.
  • a set-top box for distributing a cryptographic key for encrypting digital data.
  • the set-top box comprises a cable tuner, a cable signal decoder and a transmitter.
  • the cable tuner is used for receiving a cable signal from cable headend, and for selecting one or more channels of the cable signal.
  • the cable signal decoder is used for receiving the channels, for exatracting the cryptographic key in an encrypted form from the channels, for extracting the digital data from the channels, and for transmitting the encrypted cryptographic key over a control bus.
  • the transmitter is used for receiving the digital data, receiving the encrypted cryptographic key over the control bus, decrypting the encrypted cryptographic key to recover the cryptographic key, encrypting the digital data using the cryptographic key to generate encrypted data, and for transmitting the encrypted data.
  • FIG. 1 is a block diagram of a digital display link system according to an embodiment of the present invention
  • FIG. 2 is a block diagram of a cryptographic key distribution system
  • FIG. 3 is a block diagram of a cryptographic key distribution system for a digital display link transmitter in an embodiment according to the present invention
  • FIG. 4 is a general flowchart of overall operations involved in the process of loading cryptographic keys into an encryptor in an embodiment according to the present invention
  • FIG. 5 is a block diagram of an encryption system within a DVD player in an embodiment according to the present invention.
  • FIG. 6 is a block diagram of a digital display link receiver including a decryptor in an embodiment according to the present invention
  • FIG. 7 is a block diagram of a cryptographic key distribution system for a digital display link transmitter in an embodiment according to the present invention.
  • FIG. 8 is a block diagram of a cryptographic key distribution system for sending encrypted keys from a computer system to a digital display link transmitter in an embodiment according to the present invention
  • FIG. 9 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a set-top box smartcard to a digital display link transmitter in an embodiment according to the present invention
  • FIG. 10 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a cable headend to a digital display link transmitter in an embodiment according to the present invention
  • FIG. 11 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a key source to a digital display link receiver in an embodiment according to the present invention
  • FIG. 12 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a cable headend to a digital display link transmitter and receiver in an embodiment according to the present invention.
  • FIG. 13 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a cable headend to a digital display link transmitter, repeater and receivers in an alternate embodiment according to the present invention.
  • One embodiment of the present invention improves upon previous attempts to manage the distribution of cryptographic keys to digital video data encryptors and decryptors.
  • One approach to the distribution of cryptographic keys has been to load the keys into a ROM (Read Only Memory) chip which is physically next to the data encryptor and on the same circuit board. If each cryptographic key is unique to the system it is used in, then each ROM has to be specifically programmed during manufacture of the system. In the conventional art, a dedicated connection between the external ROM chip and the data encryptor has been provided.
  • one embodiment of the present invention uses RAM (Random Access Memory) on the same integrated circuit as the data encryptor.
  • RAM Random Access Memory
  • incoming digital video signal connections to the data encryptor integrated circuit is used to transmit cryptographic keys to the RAM.
  • other connections such as, for example, an I 2 C control bus may be used to transmit the cryptographic keys to the RAM.
  • these embodiments of the present invention may not require any additional pins or electrical connections to be made to the data encryptor. Given the increasing complexity of today's integrated circuits and the increasing number of pins needed for external connections, eliminating even a few extra pins may be important to meet IC (integrated circuit) design goals.
  • a cryptographic decryptor stores the cryptographic keys needed for decoding an encrypted data stream. Similar to the case of the encryptor, the cryptographic keys conventionally have been stored in an adjacent ROM chip. In an embodiment according to the present invention, the decryptor stores the decoding keys in RAM, instead of on the ROM chip. In other embodiments, the cryptographic keys may be loaded directly to the encryptor (e.g., a register on the encryptor) without being stored in memory (e.g., RAM or ROM) first.
  • the cryptographic keys preferably are encrypted and then sent from a transmitter to a receiver over the display link.
  • all key storage preferably is managed from the transmitter.
  • the cryptographic keys are not stored permanently in the source video system, but can be downloaded from another source, such as a set-top box.
  • a digital video source 101 is coupled to a transmitter 103 via input lines 102 .
  • digital video data from the digital video source 101 preferably is encrypted for transmission on digital display link 104 .
  • the digital video source 101 may also provide other data, such as, for example, multimedia data and/or cryptographic keys for encryption of the digital video/multimedia data.
  • the multimedia data may include one or more of, but is not limited to, video, audio, web contents, graphics and text.
  • a receiver 105 On the display side of the system, a receiver 105 , among other processing operations, preferably decrypts the encrypted digital video/multimedia signal received over the digital display link 104 and produces a digital video signal, which is sent on output lines 106 to a display 107 .
  • the digital display link 104 may also be used to send decryption keys to the receiver 105 for decrypting the received encrypted digital video/multimedia signal.
  • the overall operation of the system may be controlled by a controller 108 using a control bus 109 .
  • the controller 108 may include a finite state machine (FSM), a microprocessor, a micro controller and/or any other suitable device for controlling the overall operation of the system.
  • FSM finite state machine
  • the digital display link 104 from the transmitter 103 to the receiver 105 may include a bi-directional signal path.
  • the bi-directional signal path may be useful when, for example, there is a video camera at the display end sending video signals back to the video source end for distribution and/or processing.
  • the input lines 102 coupled to the transmitter 103 and the output lines 106 coupled to the receiver 105 should be physically secured to protect the digital video data on them.
  • these input and output lines are usually within separate physical enclosures.
  • the digital display link 104 includes a cable between the video source and a display, and the data flowing through the cable should be protected via encryption to prevent it from being copied illegally.
  • FIG. 2 is a block diagram of a cryptographic key distribution system.
  • Incoming digital video signals 201 are encrypted by an encryptor 202 according to the cryptographic keys stored in ROM 203 .
  • the ROM 203 for example, may be implemented on a separate IC chip.
  • the encryptor 202 produces an encrypted video signal 204 .
  • Key loading and encryption are controlled by controller 206 , which uses a control bus 205 .
  • FIG. 2 There are several limitations to the system in FIG. 2. One is that it permanently stores the encryption keys in the ROM 203 adjacent to the encryptor 202 . Having the keys permanently stored on a separate integrated circuit on the circuit board makes the keys susceptible to being stolen and/or bypassed. Another difficulty is that the keys stored in a ROM cannot be changed. It would be useful to have a capability to change keys if the keys originally loaded in the equipment are compromised and need to be replaced.
  • connection between the encryptor 202 and the ROM 203 may require additional pins on the encryptor package. This may be difficult to provide, especially if the encryptor 202 is a part of a larger system on a chip (SOC), which typically already has many pins with none to spare.
  • SOC system on a chip
  • FIG. 3 is a block diagram of a cryptographic key distribution system for a digital display link transmitter.
  • incoming digital video signals 301 are coupled to an encryptor 306 via a multiplexer 303 , incoming data lines 311 and a selector switch 305 .
  • the incoming digital video signals 301 may also include multimedia signals and/or other data.
  • the multimedia signals may include one or more of, but is not limited to, video, audio, web contents, graphics and text.
  • the encryptor 306 preferably has a video port, which may also be referred to as a pixel port or data port, for receiving the incoming digital video signals from the selector switch 305 .
  • the encryptor 306 preferably encrypts the digital video signals 301 to produce encrypted digital video signals 308 .
  • the encrypted digital video signals 308 may also include encrypted multimedia signals and/or encrypted data.
  • the encryptor 306 preferably should have secure input connections (i.e., incoming data lines 311 ), so as to prevent the digital video signals 301 , which are not encrypted, from being intercepted and/or copied. Because of the secure connections to the encryptor 306 , encryption keys 302 , which may also be referred to as cryptographic keys or keys, may be loaded into the encryptor 306 on the incoming data lines 311 . In one embodiment of the present invention, the encryption keys preferably are loaded in RAM 307 prior to being loaded in the encryptor 306 . The RAM 307 in other embodiments may be replaced by another suitable storage medium. The encryption keys are then loaded to the encryptor 306 via a key port of the encryptor. If the encryptor 306 and the RAM 307 are fabricated on the same IC chip and the incoming data lines 311 are used to input the encryption keys, there is no need for extra package pins on the display link transmitter.
  • secure input connections i.e., incoming data
  • the encryption keys 302 preferably are loaded via the multiplexer 303 onto the incoming data lines 311 to be stored in the RAM 307 .
  • the incoming data lines 311 are coupled to the RAM 307 via the selector switch 305 which selects between the encryptor 306 (e.g., for the digital video signals 301 ) and the RAM 307 (e.g., for the encryption keys 302 ).
  • the keys stored in the RAM 307 preferably are then loaded into the encryptor 306 via the key port for encryption of the digital video signals 301 .
  • the encryption keys loaded into the RAM 307 typically are stored there temporarily and may be reloaded as needed from internal or external sources, such as a software program, an encrypted DVD, a smart card, a set-top box, a cable modem or any other suitable key source.
  • the encryption keys may also be stored in a ROM or PROM module within another system chip upstream of the encryptor system.
  • the operation of the system in FIG. 3 preferably is controlled by a controller 309 using a control bus 310 .
  • the control bus 310 may include an I 2 C control bus or any other suitable control bus.
  • the controller for example, may include a finite state machine (FSM), a microprocessor, a micro controller, an ASIC or any other suitable device for controlling traffic on the control bus 310 .
  • FSM finite state machine
  • the encryption keys may be loaded directly onto a register in the encryptor 306 and not stored in the RAM 307 or any other memory.
  • the encryption keys may be loaded to either the RAM 307 or the encryptor 306 via the control bus 310 , which may be an I 2 C control bus. In this case, since the encryption keys 302 do not have to share the incoming data lines 311 with the digital video signals 301 , the multiplexer 303 and/or the selector switch 305 may not be needed.
  • FIG. 4 is a general flowchart of operations in the process of loading cryptographic keys into an encryptor, such as, for example, the encryptor 306 of FIG. 3.
  • the loading of the cryptographic keys is initialized in step 401 and a counter K is reset to zero.
  • the counter K preferably keeps track of the number of times a different key or segment of a key has been loaded into RAM, such as, for example, the RAM 307 of FIG. 3. For example, loading of different keys or key segments are used in situations when more than one key is required for encryption or when a key is split into segments because the key is too long to be loaded in one load cycle.
  • video input lines such as, for example, the incoming data lines 311 of FIG. 3, carry a composite video RGB signal
  • the data on the video input lines is in a parallel format and each data element is a byte
  • the video input lines include 24 parallel data lines within. This allows a 24-bit key or segment of a key to be input into the encryptor during a single key load cycle. If a key is part of a set of keys, then multiple load cycles may be needed to load all of the keys.
  • a variable M is set during step 401 to the number of load cycles needed to load all the keys or key segments needed by the encryptor.
  • a key source which contains keys, such as, for example, the encryption keys 302 of FIG. 3, preferably is selected as input to a multiplexer, such as, for example, the multiplexer 303 of FIG. 3.
  • a key output of a switch such as, for example, the switch 305 of FIG. 3, preferably is selected as input to the RAM. Selecting these two paths provides a path from key source 302 to RAM 307 .
  • a key or key segment from the key source preferably is acquired via the video input lines.
  • the acquired key preferably is loaded into the RAM.
  • the counter K which is equal to the number of load cycles performed, preferably is incremented by 1.
  • step 407 the counter K preferably is compared to M, where M is the number of load cycles needed to load all the needed keys. If the counter K is equal to M, then the loading of the keys has been completed as indicated in step 408 . If the counter K is less than M, then steps 404 , 405 and 406 preferably are repeated to acquire the next key or key segment, and the counter K, after being incremented by 1, is compared once again with M. Hence, steps 404 , 405 , 406 and 407 are repeated in a loop until all the keys or key segments are loaded.
  • FIG. 5 is a block diagram of an encryption system within a DVD player in an embodiment according to the present invention.
  • DVD data 501 from a DVD reader is input to a DVD data decoder 502 .
  • the DVD data 501 may include video data and/or multimedia data.
  • the DVD data 501 may also include other data, such as, for example, graphics or closed caption information.
  • the DVD data decoder 502 preferably decodes the DVD data 501 to generate digital video, multimedia and/or other data.
  • a multiplexer 504 couples either the digital video from the DVD data decoder 502 or cryptographic keys from a key source 503 to a selector switch 510 .
  • the key source 503 may include any suitable storage medium for storing the cryptographic keys.
  • the selector switch 510 preferably provides the digital video, multimedia and/or other data for encryption to the encryptor 505 via a video port, which may also be referred to as a pixel port or a data port.
  • the selector switch 510 preferably also provides the cryptographic keys to the encryptor 505 via a key port.
  • the encryptor 506 preferably contains a register for storing the received cryptographic keys.
  • the key source 503 may provide the cryptographic keys to a RAM external to the encryptor 505 via the multiplexer 504 and the selector switch 510 and not directly to the key port on the encryptor 505 .
  • the cryptographic keys may be stored in the RAM temporarily, and then loaded onto the register in the encryptor 505 via the key port as needed for encryption of the digital video, multimedia, and/or other data.
  • the RAM may be implemented on the same integrated circuit chip as the encryptor 505 .
  • the encrypted digital video, as well as the encrypted multimedia and/or other encrypted data preferably is sent to a display link transmitter 506 , which provides an output signal suitable for transmission over display link 507 .
  • the encrypted digital video, multimedia and/or other data preferably are encrypted in such a way that interception and/or decryption of the digital video, multimedia and/or other data preferably is prevented.
  • the operation of the system in FIG. 5 preferably is controlled by a controller 508 using a control bus 509 .
  • the control bus 509 may include an I 2 C control bus or any other suitable control bus.
  • the controller for example, may include a finite state machine (FSM), a microprocessor, a micro controller, an ASIC or any other suitable device for controlling traffic on the control bus 509 .
  • FSM finite state machine
  • the cryptographic keys may be loaded to either the RAM or directly to the encryptor 505 via the control bus 509 , which may be an I 2 C control bus.
  • the control bus 509 which may be an I 2 C control bus.
  • the encryptor 505 may also encode video decryption keys and transmit over the display link to a digital display link receiver to be used for decryption of the encrypted digital video, multimedia and/or other data at the receiver side (e.g., display side).
  • the encoded video decryption keys are decoded at the receiver side prior to the decryption of the encrypted digital video, multimedia and/or other data.
  • the encoding and decoding of the cryptographic keys are described further in reference to FIG. 6.
  • FIG. 6 is a block diagram of a digital display link receiver including a decryptor 605 in an embodiment according to the present invention.
  • Incoming serial data preferably arrives over a display link 601 .
  • the incoming serial data preferably includes encrypted digital video, multimedia and/or other data, and may have been transmitted over the display link 507 of FIG. 5.
  • the incoming serial data preferably is received by a display link receiver 602 .
  • the display link receiver 602 preferably converts the incoming serial data into a video data in parallel format and sends the parallel video data to the decryptor 605 via a switch 604 .
  • the display link receiver 602 may also extract multimedia and/or other data from the incoming serial data, and send to the decryptor 605 for decryption.
  • the decryptor 605 preferably generates decrypted digital video 608 , which may include decrypted multimedia and/or decrypted data, and sends it via physically secure internal wiring to a video display or monitor.
  • the operation of the system in FIG. 6 preferably is controlled by a controller 609 using a control bus 610 .
  • the control bus 610 may include an I 2 C control bus or any other suitable control bus.
  • the controller for example, may include a finite state machine (FSM), a microprocessor, a micro controller, an ASIC or any other suitable device for controlling traffic on the control bus 610 .
  • FSM finite state machine
  • a public key system Prior to the start of decryption of the encrypted digital video, multimedia and/or other data, a public key system is used to cipher the video decryption keys, so that they can be sent via the digital display link to the decryptor 605 .
  • a public key preferably is loaded from a key source, such as, for example, the key source 503 of FIG. 5, into an encryptor, such as, for example the encryptor 505 .
  • a corresponding private key preferably is loaded from PROM 607 into RAM 606 . The private key is used to decipher the video decryption keys sent from the display link transmitter in FIG. 5.
  • the video decryption keys needed by the decryptor 605 preferably are provided by the key source and encrypted by the encryptor, and sent to the display link receiver in FIG. 6 during a startup procedure.
  • the private key may be loaded directly to a decryptor register from the PROM 607 via a key port of the decryptor 605 without being stored temporarily in RAM.
  • Public key cryptography is well known to those skilled in the art and the public key cryptography used in this embodiment is one example of the use of public key cryptography to protect the transmission of decryption keys to the receiver. In other embodiments, other cryptographic systems may be used to protect the keys during transmission to the receiver. For example, in one embodiment of the present invention DES (Data Encryption Standard) encoding and decoding may be used to encode and decode keys.
  • DES Data Encryption Standard
  • the display link receiver in FIG. 6 receives the ciphered video decryption keys on the display link 601 .
  • the ciphered video decryption keys are extracted by the display link receiver 602 .
  • the ciphered video decryption keys are input to the decryptor 605 , which uses the private key stored in the PROM 607 to decipher the video decryption keys, which are then stored in the RAM 606 .
  • the display link receiver is ready to start decrypting the encrypted video data sent by a display link transmitter, such as, for example, the display link transmitter 506 of FIG. 5.
  • Steps 2 to 6 take place in the display link transmitter.
  • Steps 1, 7 to 9, 11 take place in the display link receiver:
  • the data encryption keys preferably are encrypted and a control bus is used to send the encrypted data encryption keys to the transmitter or the receiver.
  • the data encryption keys preferably are encrypted using an encryption key, which preferably is located closely to the source of the data encryption keys.
  • the encrypted data encryption keys preferably are decrypted using a decryption key, which may be on the same integrated circuit as the digital display link transmitter or receiver.
  • a DVI (Digital Video Interface) system typically uses an I 2 C control bus for sending control information between a DVI transmitter and a DVI receiver.
  • the I 2 C control bus in a DVI system can be used to send encrypted data encryption keys to a DVI transmitter and a DVI receiver.
  • FIG. 7 is a block diagram of a cryptographic key distribution system for a digital display link transmitter in an embodiment according to the present invention.
  • a key source 701 and a display link transmitter 710 .
  • the display link transmitter 710 preferably is a digital transmitter, which transmits data in DVI format. In other embodiments, the display link transmitter 710 may also be an analog transmitter.
  • the key source 701 and the display link transmitter 710 can be in various different configurations.
  • the key source 701 and the display link transmitter 710 may be within a same physical device, such as a set-top box, or they could be in two or more separate physical systems.
  • the key source 701 and/or the display link transmitter 710 may comprise additional components that are not illustrated in FIG. 7.
  • the key source 701 includes data encryption keys 702 , which may be stored in memory.
  • the data encryption keys 702 preferably are encrypted by a data key encryptor 704 using encryption keys 703 , which may also be stored in memory.
  • the encrypted data encryption keys preferably are sent to the display link transmitter 710 over a control bus 705 , which may be an I 2 C control bus.
  • the encrypted data encryption keys are received over the control bus 705 . Then the encrypted data encryption keys preferably are decrypted by a data key decryptor 714 using decryption keys 715 .
  • the decryption keys 715 may be stored in memory, such as, for example, a Programmable Read Only Memory (PROM), which may be on the same integrated circuit (IC) or on the same printed circuit board (PCB) as the rest of the display link transmitter 710 .
  • PROM Programmable Read Only Memory
  • a data encryptor 712 uses the data encryption keys recovered by the data key decryptor 714 to encrypt digital data 711 to generate encrypted data 713 .
  • the encrypted data 713 is then ready for further processing and/or transmission by the display link transmitter 710 .
  • the digital data 711 may include one or more of, but is not limited to, multimedia, video, audio, web contents, graphics and text.
  • FIG. 8 is a block diagram of a cryptographic key distribution system for sending encrypted data encryption keys from a computer system 801 to a display link transmitter 810 in an embodiment according to the present invention.
  • the display link transmitter 810 preferably is a digital transmitter, which preferably transmits data in DVI format. In other embodiments, the display link transmitter 810 may be an analog transmitter.
  • the computer system 801 and the display link transmitter 810 may include other components in addition to the components illustrated in FIG. 8. Further, those skilled in the art would appreciate that the computer system 801 and the display link transmitter 810 may have various different configurations. For example, the computer system 801 and the display link transmitter 810 may be within the same physical device, such as a personal computer, or they may be in two or more physically separate devices.
  • the computer system 801 includes data encryption keys 802 , which may be stored in memory and which preferably are encrypted by a data key encryptor 804 using encryption keys 803 , which may also be stored in memory.
  • the data key encryptor 804 preferably is implemented using software, but may be implemented using software, firmware, hardware or any combination thereof.
  • the data key encryptor 804 may work together with a microprocessor 807 of the computer system 801 .
  • the data key encryptor 804 may run on the microprocessor 807 .
  • the encrypted data encryption keys preferably are sent to the display link transmitter 810 over a control bus 805 , which may be an I 2 C control bus.
  • the encrypted data encryption keys are received over the control bus 805 , and preferably are decrypted by a data key decryptor 814 using decryption keys 815 .
  • the decryption keys 815 may be stored in memory, such as, for example, a Programmable Read Only Memory (PROM), which may be on the same integrated circuit (IC) or on the same printed circuit board (PCB) as the rest of the display link transmitter 810 .
  • PROM Programmable Read Only Memory
  • a data encryptor 812 preferably uses the data encryption keys recovered by the data key decryptor 814 to encrypt digital data 811 to generate encrypted data 813 .
  • the encrypted data 813 is then ready for further processing in the display link receiver 810 and/or to be sent to a display link receiver.
  • the digital data 811 may include one or more of, but is not limited to, multimedia, video, audio, web contents, graphics and text.
  • FIG. 9 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a set-top box smartcard 906 to a display link transmitter 910 in an embodiment according to the present invention.
  • the display link transmitter 910 preferably is a digital transmitter, which preferably transmits data in DVI format. In other embodiments, the display link transmitter 910 may be an analog transmitter.
  • the systems shown in FIG. 9 represent a portion of the systems in a set-top box, which may include additional components not illustrated in FIG. 9.
  • An incoming cable signal 902 is processed by a cable tuner 903 to select a desired channel, which is sent to a cable signal decoder 904 .
  • the output of the cable signal decoder 904 is digital data 911 , which is sent to the display link transmitter 910 .
  • the digital data 911 may contain video as well as other data, such as, for example, multimedia data.
  • the multimedia data may include one or more of, but is not limited to, video, audio, web contents, graphics, text and other information.
  • the display link transmitter 910 only a portion of which is shown in FIG. 9, preferably converts the incoming digital data 911 to encrypted data 913 .
  • Encrypted data encryption keys preferably are loaded into the smartcard 906 , and preferably are sent to the display link transmitter over a control bus 905 to the display link transmitter 910 .
  • the encrypted data encryption keys preferably are decrypted by a data key decryptor 914 using decryption keys 915 .
  • the decryption keys 915 may be stored in memory, such as, for example, a Programmable Read Only Memory (PROM), which may be on the same integrated circuit (IC) or on the same printed circuit board (PCB) as the rest of the display link transmitter 910 .
  • PROM Programmable Read Only Memory
  • a data encryptor 912 preferably encrypts the digital data 911 into the encrypted data 913 using the data encryption keys generated by the data key decryptor 914 .
  • the encrypted data encryption keys 907 carried over the control bus 905 and the encrypted data 913 preferably are protected from eavesdropping, and preferably do not require additional security measures.
  • FIG. 10 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a cable headend to a display link transmitter 1010 in an embodiment according to the present invention.
  • the display link transmitter 1010 preferably is a digital transmitter, which preferably transmits data in DVI format. In other embodiments, the display link transmitter 1010 may be an analog transmitter.
  • FIG. 10, for example, may represent a portion a set-top box. Those skilled in the art would appreciate that set-top boxes would include other components not illustrated in FIG. 10.
  • An incoming cable signal 1002 is processed by a cable tuner 1003 to select a desired channel, and a cable tuner output 1006 is sent to a cable signal decoder 1004 .
  • One output of the cable signal decoder 1004 is digital data 1011 , which is sent to the display link transmitter 1010 .
  • a data encryptor 1012 which is a part of the display link transmitter 1010 , preferably encrypts the digital data 1011 into encrypted data 1013 .
  • Some channels of the incoming cable signal 1002 may carry premium content, such as HDTV movie signals (e.g., pay-per-view), which should be encrypted using data encryption (cryptographic) keys before they are sent from a set-top box to a display.
  • the data encryption keys needed to encrypt the HDTV video may be downloaded from the cable headend.
  • the data encryption keys in encrypted form may be downloaded using the same channel as the HDTV movie signals or using another channel.
  • the cable signal decoder 1004 may extract the encrypted data encryption keys from the cable tuner output 1006 .
  • the encryption keys Prior to the encryption of any digital data 1011 , the encryption keys preferably are loaded into the transmitter 1010 .
  • the encrypted data encryption keys preferably are sent to the transmitter 1010 over a control bus 1005 , which may be an I 2 C control bus.
  • the encrypted data encryption keys preferably are decrypted by a data key decryptor 1014 using decryption keys 1015 .
  • the decryption keys 1015 may be stored in memory, such as, for example, a Programmable Read Only Memory (PROM), which may be on the same integrated circuit (IC) or on the same printed circuit board (PCB) as the rest of the display link transmitter 1010 .
  • PROM Programmable Read Only Memory
  • a data encryptor 1012 encrypts the digital data 1011 into encrypted data 1013 using the data encryption keys generated by the data key decryptor 1014 .
  • the digital data stream 1011 may also contain data other than the HDTV movie signals, such as, for example, video and multimedia data.
  • the multimedia data may include one or more of, but is not limited to, video, audio, web contents, graphics, text and other information.
  • the encrypted data encryption keys carried over the control bus 1005 and the encrypted data 1013 preferably are protected from eavesdropping, and preferably do not require additional security measures.
  • FIG. 11 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a key source 1101 to a display link receiver 1110 in an embodiment according to the present invention.
  • the display link receiver 1110 preferably is a digital receiver, which preferably receives data in DVI format. In other embodiments, the display link receiver may be an analog receiver.
  • the key source 1101 and the data link receiver 1110 may include other components that are not illustrated in FIG. 11.
  • the key source 1101 and the data link receiver 1110 may have various different configurations.
  • the key source 1101 may be in a set-top box, a DVD player or a personal computer while the display link receiver 1110 may be in a digital monitor or an HDTV.
  • the key source 1101 preferably includes data decryption keys 1102 , which may be stored in memory, and which preferably are encrypted by a data key encryptor 1104 using encryption keys 1103 , which may also be stored in memory.
  • the encrypted data encryption keys preferably are sent to the display link receiver 1110 over a control bus 1105 , which may be an I 2 C bus.
  • the encrypted data encryption keys are received from the control bus 1105 , and preferably are decrypted by a data key decryptor 1114 using decryption keys 1115 , which may be stored in memory.
  • a data decryptor 1112 uses the data decryption keys generated by the data key decryptor 1114 to decrypt encrypted data 1111 to generate digital data 1113 .
  • the digital data 1113 is then ready for further processing by the display link receiver 1110 and/or transmission to a display device.
  • the encrypted data may be received from a set-top box, a computer, a DVD player or any other video/data source that outputs data in an encrypted form.
  • the encrypted data 1111 may include one or more of, but is not limited to, multimedia, video, audio, web contents, graphics, text or other data.
  • FIG. 12 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a cable headend to a display link transmitter 1212 and a display link receiver 1214 in an embodiment according to the present invention.
  • the cryptographic key distribution system of FIG. 12 may include a part of a set-top box comprising a cable tuner 1203 , a cable signal decoder 1204 , the display link transmitter 1212 and the display link receiver 1214 .
  • An incoming cable signal 1202 from the cable headend preferably is processed by the cable tuner 1203 to select a desired channel, which preferably is sent to the cable signal decoder 1204 .
  • One output of the cable signal decoder 1204 is digital data 1211 , which is sent to the display link transmitter 1212 .
  • the display link transmitter 1212 preferably converts digital data 1211 to an encrypted data stream 1213 .
  • the display link transmitter 1212 may include a data encryptor similar to the data encryptor 1012 of FIG. 10.
  • the encrypted data 1213 preferably is introduced into the display link receiver 1214 .
  • the display link receiver 1214 may include a data decryptor similar to the data decryptor 1112 of FIG. 11.
  • Digital data output 1215 of the display link receiver 1214 may be sent to a digital display.
  • the display link receiver 1214 may be a part of the digital display so that the digital data 1215 is physically protected within the display system.
  • Some channels of the incoming cable signal 1202 may carry premium content, such as HDTV movie signals (e.g., pay-per-view), which should be encrypted before they are sent from the set-top box over a display link to a digital display.
  • Data encryption keys used by the display link transmitter 1212 to encrypt the HDTV movie signals may be downloaded from the cable headend, using the same channel as the HDTV movie signals or using another channel.
  • the cable signal decoder 1204 preferably extracts encrypted data encryption and decryption keys from the output of the cable tuner 1203 .
  • Both the encrypted data encryption keys and the encrypted data decryption keys preferably are sent over a control bus 1205 , which may be an I 2 C bus.
  • the encrypted data encryption keys preferably are loaded to the display link transmitter 1212 from the control bus 1205 , prior to encryption of any digital data 1211 .
  • the encrypted data decryption keys preferably are loaded to the display link receiver 1214 from the control bus 1205 , prior to any decryption of the encrypted data 1213 .
  • the digital data stream 1211 may also contain other data, such as, for example, multimedia data.
  • multimedia data may include one or more of, but is not limited to, video, audio, web contents, graphics, text and other information.
  • FIG. 13 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a cable headend to a display link transmitter 1311 , a repeater 1313 and receivers in an alternate embodiment according to the present invention.
  • the cryptographic key distribution system of FIG. 13, for example, may include a part of a set-top box including a cable tuner 1303 , a cable signal decoder 1304 and a display link transmitter 1311 .
  • An incoming cable signal 1302 from the cable headend is processed by the cable tuner 1303 to select a desired channel, which is sent to the cable signal decoder 1304 .
  • One output of the cable signal decoder 1304 is digital data 1310 , which is provided to the display link transmitter 1311 .
  • the display link transmitter 1311 preferably converts the digital data 1310 to encrypted data, which is sent to the repeater 1313 via display link 1312 .
  • the display link transmitter 1311 may include a data encryptor similar to the data encryptor 1012 of FIG. 10.
  • the repeater 1313 preferably decrypts the incoming encrypted data and then encrypts the resulting digital data and sends it out to a receiver A ( 1315 ) and to a receiver B ( 1319 ) via display links 1314 and 1318 , respectively.
  • the receiver A ( 1315 ) preferably decrypts the incoming encrypted data and sends the resulting digital data to a display A ( 1317 ).
  • the receiver B ( 1319 ) preferably decrypts the incoming encrypted data and sends the resulting digital data to a display B ( 1321 ).
  • Some channels of the incoming cable signal 1302 may carry premium content, such as HDTV movie signals (e.g., pay-per-view), which should be encrypted before they can be sent from a set-top box over a display link to a digital display.
  • Data encryption and decryption keys used by the display link transmitter 1311 , the repeater 1313 and the receivers A and B ( 1315 , 1319 ) may be downloaded from the cable headend using the same channel as the HDTV movie signals or using another channel.
  • the cable signal decoder 1304 preferably extracts the encrypted data encryption and decryption keys from the output of the cable tuner 1303 .
  • the encrypted data encryption and decryption keys preferably are sent over a control bus 1305 , which may be an I 2 C control bus.
  • the encrypted data encryption keys preferably are loaded from the control bus 1305 into the display link transmitter 1311 .
  • the encrypted data decryption and encryption keys preferably are loaded from the control bus 1305 into the repeater 1313 .
  • the repeater 1313 preferably provides the encrypted data decryption keys from the control bus 1305 to the display link receivers A and B ( 1315 , 1319 ).
  • the repeater 1313 may provide the encrypted data decryption keys to the display link receiver A ( 1315 ) over a control bus (not shown) between them.
  • the repeater 1313 may also provide the encrypted data decryption keys to the display link receiver B ( 1319 ) over a control bus (not shown) between them.
  • the display link receivers A and B ( 1315 , 1319 ) may receive the encrypted data decryption keys directly from the control bus 1305 .
  • the digital data 1310 may also contain data other than video including HDTV movie signals, such as, for example, multimedia data.
  • multimedia data may include one or more of, but is not limited to, video, audio, web contents, graphics, text and other information.

Abstract

A system and method for distribution of cryptographic keys to data encryption and decryption devices used to protect digital video/multimedia data transmitted over a display link between a digital video/multimedia source and a display device are provided. The digital data, which may be in Digital Visual Interface (DVI) format, from a digital video/multimedia source, such as, for example, a Digital Versatile Disk (DVD) player, a set-top box, or a computer, is encrypted prior to transmission on the display link. Use of key management and storage that are external to the data encryption or decryption devices enables downloading of new keys from external key sources. Encrypted data encryption and decryption keys may be included in a cable signal received by the set-top box. The data encryption and decryption keys from an internal or external key source may be encoded in the DVD player, set-top box, or computer prior to being sent over a control bus to a display link receiver or a display device.

Description

  • The present application is a Continuation-in-Part of U.S. patent application Ser. No. 09/844,898 filed Apr. 27, 2001, which claims benefit of U.S. Provisional Application No. 60/200,194 filed Apr. 28, 2000 entitled “Cryptographic Key Distribution System and Method for Digital Video Systems” filed Apr. 27, 2001, the contents of which are fully incorporated by reference herein.[0001]
  • FIELD OF THE INVENTION
  • The present invention relates to a system and method for distributing cryptographic keys to digital data encryption and decryption devices, and particularly to the distribution of cryptographic keys for digital video and/or multimedia systems. [0002]
  • BACKGROUND OF THE INVENTION
  • The use of digital technology continues to make rapid advances in many fields, and the digital technology is increasingly being applied to areas that once were completely relegated to the analog domain. One such area is distribution of motion pictures, which are increasingly being digitized and sold on DVDs (Digital Versatile Disks). The low cost and high quality afforded by the DVDs have led to a boom in the sale of DVD players and DVDs. [0003]
  • There is a great deal of concern among the content producers, e.g., the movie studios, about the release of motion pictures in digital formats. The content producers are particularly concerned about the next generation of DVDs, which will carry high definition video images. For example, a consumer can buy a DVD and duplicate it illegally without any loss in video quality, if he can access the digital video signals. In order to prevent easy access to the digital video signals, most DVD players on the market today provide video output in analog format only. [0004]
  • DVDs containing high definition video images of motion pictures may not be available for sale unless the data on the DVDs can be protected from copying, both while on the disk and during its routing to a display device. Therefore, before consumer type DVD players with digital video outputs are available for sale, the content producers and DVD player manufacturers preferably should agree on a secure way of sending digital video data from the DVD players to video display monitors or televisions. [0005]
  • The digital video data is typically in parallel format and is converted to serial format (for digital video output) by a digital transmitter before being sent out on a digital display link to a video monitor or a television. On the display side, a digital receiver converts the serial data back into parallel format. The digital signal on the display link cable, if not protected, e.g., via encryption, can be intercepted and copied by a person wanting to steal the digital video data. [0006]
  • There is a standard digital display link for connecting a digital video signal from a computer to a display monitor, which is known as Digital Visual Interface (DVI). There is also a proposed standard for the content protection of such display links, known as High-bandwidth Digital Content Protection (HDCP), which provides for the encryption of digital video data between a digital video source and a display monitor using cryptographic keys. Both the digital video source and the display monitor should preferably have access to the cryptographic keys to encrypt and decrypt, respectively, the digital video data. [0007]
  • Therefore, it is desirable to provide an improved system and method for loading of the cryptographic keys to a digital video data encryptor on the digital video source side and the decryptor on the display monitor side. [0008]
  • SUMMARY OF THE INVENTION
  • Accordingly, in an embodiment according to the present invention, a system for distributing a cryptographic key for encrypting digital data is provided. The system comprises a key source and a transmitter. The key source is used for storing the cryptographic key, encrypting the cryptographic key, and for transmitting the encrypted cryptographic key over a control bus. The transmitter is used for receiving the digital data, receiving the encrypted cryptographic key over the control bus, decrypting the encrypted cryptographic key to recover the cryptographic key, encrypting the digital data using the cryptographic key to generate encrypted data, and for transmitting the encrypted data. [0009]
  • In another embodiment of the present invention, a system for distributing a cryptographic key for decrypting encrypted data is provided. The system comprises a key source and a receiver. The key source is used for storing the cryptographic key, encrypting the cryptographic key, and for transmitting the encrypted cryptographic key over a control bus. The receiver is used for receiving the encrypted data, receiving the encrypted cryptographic key over the control bus, decrypting the encrypted cryptographic key to recover the cryptographic key, decrypting the encrypted data using the cryptographic key to generate digital data, and for transmitting the digital data. [0010]
  • In yet another embodiment of the present invention, a method of distributing a cryptographic key for encrypting digital data is provided. The cryptographic key is stored in a key source, and then encrypted to generate an encrypted cryptographic key. The encrypted cryptographic key is transmitted from the key source over a control bus, and loaded into a transmitter from the control bus. The encrypted cryptographic key is decrypted in the transmitter to recover the cryptographic key. The digital data is introduced into the transmitter, and encrypted using the recovered cryptographic key to generate encrypted data, which is transmitted from the transmitter. [0011]
  • In still another embodiment of the present invention, a method of distributing a cryptographic key for decrypting encrypted data is provided. The cryptographic key is stored in a key source, and then encrypted to generate an encrypted cryptographic key. The encrypted cryptographic key is transmitted from the key source over a control bus, and loaded into a receiver from the control bus. The encrypted cryptographic key is decrypted in the receiver to recover the cryptographic key. The encrypted data is introduced into the receiver, and decrypted using the recovered cryptographic key to generate decrypted data, which is transmitted from the receiver. [0012]
  • In a further embodiment of the present invention, a set-top box for distributing a cryptographic key for encrypting digital data is provided. The set-top box comprises a cable tuner, a cable signal decoder and a transmitter. The cable tuner is used for receiving a cable signal from cable headend, and for selecting one or more channels of the cable signal. The cable signal decoder is used for receiving the channels, for exatracting the cryptographic key in an encrypted form from the channels, for extracting the digital data from the channels, and for transmitting the encrypted cryptographic key over a control bus. The transmitter is used for receiving the digital data, receiving the encrypted cryptographic key over the control bus, decrypting the encrypted cryptographic key to recover the cryptographic key, encrypting the digital data using the cryptographic key to generate encrypted data, and for transmitting the encrypted data. [0013]
  • These and other embodiments of the present invention, and advantages associated with them, will become apparent from the following detailed description and the drawings.[0014]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of a digital display link system according to an embodiment of the present invention; [0015]
  • FIG. 2 is a block diagram of a cryptographic key distribution system; [0016]
  • FIG. 3 is a block diagram of a cryptographic key distribution system for a digital display link transmitter in an embodiment according to the present invention; [0017]
  • FIG. 4 is a general flowchart of overall operations involved in the process of loading cryptographic keys into an encryptor in an embodiment according to the present invention; [0018]
  • FIG. 5 is a block diagram of an encryption system within a DVD player in an embodiment according to the present invention; [0019]
  • FIG. 6 is a block diagram of a digital display link receiver including a decryptor in an embodiment according to the present invention; [0020]
  • FIG. 7 is a block diagram of a cryptographic key distribution system for a digital display link transmitter in an embodiment according to the present invention; [0021]
  • FIG. 8 is a block diagram of a cryptographic key distribution system for sending encrypted keys from a computer system to a digital display link transmitter in an embodiment according to the present invention; [0022]
  • FIG. 9 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a set-top box smartcard to a digital display link transmitter in an embodiment according to the present invention; [0023]
  • FIG. 10 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a cable headend to a digital display link transmitter in an embodiment according to the present invention; [0024]
  • FIG. 11 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a key source to a digital display link receiver in an embodiment according to the present invention; [0025]
  • FIG. 12 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a cable headend to a digital display link transmitter and receiver in an embodiment according to the present invention; and [0026]
  • FIG. 13 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a cable headend to a digital display link transmitter, repeater and receivers in an alternate embodiment according to the present invention.[0027]
  • DETAILED DESCRIPTION
  • One embodiment of the present invention improves upon previous attempts to manage the distribution of cryptographic keys to digital video data encryptors and decryptors. One approach to the distribution of cryptographic keys has been to load the keys into a ROM (Read Only Memory) chip which is physically next to the data encryptor and on the same circuit board. If each cryptographic key is unique to the system it is used in, then each ROM has to be specifically programmed during manufacture of the system. In the conventional art, a dedicated connection between the external ROM chip and the data encryptor has been provided. [0028]
  • Instead of using the ROM chip adjacent to the data encryptor to store the keys, one embodiment of the present invention uses RAM (Random Access Memory) on the same integrated circuit as the data encryptor. In one embodiment of the present invention, incoming digital video signal connections to the data encryptor integrated circuit is used to transmit cryptographic keys to the RAM. In other embodiments, other connections, such as, for example, an I[0029] 2C control bus may be used to transmit the cryptographic keys to the RAM.
  • Thus, these embodiments of the present invention may not require any additional pins or electrical connections to be made to the data encryptor. Given the increasing complexity of today's integrated circuits and the increasing number of pins needed for external connections, eliminating even a few extra pins may be important to meet IC (integrated circuit) design goals. [0030]
  • On the display side of a digital display link, a cryptographic decryptor stores the cryptographic keys needed for decoding an encrypted data stream. Similar to the case of the encryptor, the cryptographic keys conventionally have been stored in an adjacent ROM chip. In an embodiment according to the present invention, the decryptor stores the decoding keys in RAM, instead of on the ROM chip. In other embodiments, the cryptographic keys may be loaded directly to the encryptor (e.g., a register on the encryptor) without being stored in memory (e.g., RAM or ROM) first. [0031]
  • In this embodiment of the present invention, the cryptographic keys preferably are encrypted and then sent from a transmitter to a receiver over the display link. In this embodiment, all key storage preferably is managed from the transmitter. In another embodiment according to the present invention, the cryptographic keys are not stored permanently in the source video system, but can be downloaded from another source, such as a set-top box. [0032]
  • Referring now to FIG. 1, a block diagram of a digital display link system according to an embodiment of the present invention is illustrated. A [0033] digital video source 101 is coupled to a transmitter 103 via input lines 102. Among other processing performed by the transmitter 103, digital video data from the digital video source 101 preferably is encrypted for transmission on digital display link 104. The digital video source 101 may also provide other data, such as, for example, multimedia data and/or cryptographic keys for encryption of the digital video/multimedia data. The multimedia data may include one or more of, but is not limited to, video, audio, web contents, graphics and text.
  • On the display side of the system, a [0034] receiver 105, among other processing operations, preferably decrypts the encrypted digital video/multimedia signal received over the digital display link 104 and produces a digital video signal, which is sent on output lines 106 to a display 107. The digital display link 104 may also be used to send decryption keys to the receiver 105 for decrypting the received encrypted digital video/multimedia signal. The overall operation of the system may be controlled by a controller 108 using a control bus 109. The controller 108 may include a finite state machine (FSM), a microprocessor, a micro controller and/or any other suitable device for controlling the overall operation of the system.
  • The digital display link [0035] 104 from the transmitter 103 to the receiver 105 may include a bi-directional signal path. The bi-directional signal path may be useful when, for example, there is a video camera at the display end sending video signals back to the video source end for distribution and/or processing.
  • The input lines [0036] 102 coupled to the transmitter 103 and the output lines 106 coupled to the receiver 105 should be physically secured to protect the digital video data on them. Thus, these input and output lines are usually within separate physical enclosures. On the other hand, the digital display link 104 includes a cable between the video source and a display, and the data flowing through the cable should be protected via encryption to prevent it from being copied illegally.
  • FIG. 2 is a block diagram of a cryptographic key distribution system. Incoming digital video signals [0037] 201 are encrypted by an encryptor 202 according to the cryptographic keys stored in ROM 203. The ROM 203, for example, may be implemented on a separate IC chip. The encryptor 202 produces an encrypted video signal 204. Key loading and encryption are controlled by controller 206, which uses a control bus 205.
  • There are several limitations to the system in FIG. 2. One is that it permanently stores the encryption keys in the [0038] ROM 203 adjacent to the encryptor 202. Having the keys permanently stored on a separate integrated circuit on the circuit board makes the keys susceptible to being stolen and/or bypassed. Another difficulty is that the keys stored in a ROM cannot be changed. It would be useful to have a capability to change keys if the keys originally loaded in the equipment are compromised and need to be replaced.
  • The connection between the encryptor [0039] 202 and the ROM 203 may require additional pins on the encryptor package. This may be difficult to provide, especially if the encryptor 202 is a part of a larger system on a chip (SOC), which typically already has many pins with none to spare.
  • FIG. 3 is a block diagram of a cryptographic key distribution system for a digital display link transmitter. In the system of FIG. 3, incoming digital video signals [0040] 301 are coupled to an encryptor 306 via a multiplexer 303, incoming data lines 311 and a selector switch 305. The incoming digital video signals 301 may also include multimedia signals and/or other data. The multimedia signals may include one or more of, but is not limited to, video, audio, web contents, graphics and text. The encryptor 306 preferably has a video port, which may also be referred to as a pixel port or data port, for receiving the incoming digital video signals from the selector switch 305. The encryptor 306 preferably encrypts the digital video signals 301 to produce encrypted digital video signals 308. The encrypted digital video signals 308 may also include encrypted multimedia signals and/or encrypted data.
  • The [0041] encryptor 306 preferably should have secure input connections (i.e., incoming data lines 311), so as to prevent the digital video signals 301, which are not encrypted, from being intercepted and/or copied. Because of the secure connections to the encryptor 306, encryption keys 302, which may also be referred to as cryptographic keys or keys, may be loaded into the encryptor 306 on the incoming data lines 311. In one embodiment of the present invention, the encryption keys preferably are loaded in RAM 307 prior to being loaded in the encryptor 306. The RAM 307 in other embodiments may be replaced by another suitable storage medium. The encryption keys are then loaded to the encryptor 306 via a key port of the encryptor. If the encryptor 306 and the RAM 307 are fabricated on the same IC chip and the incoming data lines 311 are used to input the encryption keys, there is no need for extra package pins on the display link transmitter.
  • Hence, prior to the start of encryption, the [0042] encryption keys 302 preferably are loaded via the multiplexer 303 onto the incoming data lines 311 to be stored in the RAM 307. The incoming data lines 311 are coupled to the RAM 307 via the selector switch 305 which selects between the encryptor 306 (e.g., for the digital video signals 301) and the RAM 307 (e.g., for the encryption keys 302). The keys stored in the RAM 307 preferably are then loaded into the encryptor 306 via the key port for encryption of the digital video signals 301.
  • The encryption keys loaded into the [0043] RAM 307 typically are stored there temporarily and may be reloaded as needed from internal or external sources, such as a software program, an encrypted DVD, a smart card, a set-top box, a cable modem or any other suitable key source. The encryption keys may also be stored in a ROM or PROM module within another system chip upstream of the encryptor system.
  • The operation of the system in FIG. 3 preferably is controlled by a [0044] controller 309 using a control bus 310. The control bus 310, for example, may include an I2C control bus or any other suitable control bus. The controller, for example, may include a finite state machine (FSM), a microprocessor, a micro controller, an ASIC or any other suitable device for controlling traffic on the control bus 310.
  • In other embodiments, the encryption keys may be loaded directly onto a register in the [0045] encryptor 306 and not stored in the RAM 307 or any other memory. In still other embodiments, the encryption keys may be loaded to either the RAM 307 or the encryptor 306 via the control bus 310, which may be an I2C control bus. In this case, since the encryption keys 302 do not have to share the incoming data lines 311 with the digital video signals 301, the multiplexer 303 and/or the selector switch 305 may not be needed.
  • FIG. 4 is a general flowchart of operations in the process of loading cryptographic keys into an encryptor, such as, for example, the [0046] encryptor 306 of FIG. 3. The loading of the cryptographic keys is initialized in step 401 and a counter K is reset to zero. The counter K preferably keeps track of the number of times a different key or segment of a key has been loaded into RAM, such as, for example, the RAM 307 of FIG. 3. For example, loading of different keys or key segments are used in situations when more than one key is required for encryption or when a key is split into segments because the key is too long to be loaded in one load cycle.
  • If video input lines, such as, for example, the [0047] incoming data lines 311 of FIG. 3, carry a composite video RGB signal, there are three channels of data. If the data on the video input lines is in a parallel format and each data element is a byte, then the video input lines include 24 parallel data lines within. This allows a 24-bit key or segment of a key to be input into the encryptor during a single key load cycle. If a key is part of a set of keys, then multiple load cycles may be needed to load all of the keys. A variable M is set during step 401 to the number of load cycles needed to load all the keys or key segments needed by the encryptor.
  • In [0048] step 402, a key source, which contains keys, such as, for example, the encryption keys 302 of FIG. 3, preferably is selected as input to a multiplexer, such as, for example, the multiplexer 303 of FIG. 3. In step 403, a key output of a switch, such as, for example, the switch 305 of FIG. 3, preferably is selected as input to the RAM. Selecting these two paths provides a path from key source 302 to RAM 307.
  • In [0049] step 404, a key or key segment from the key source preferably is acquired via the video input lines. In step 405, the acquired key preferably is loaded into the RAM. In step 406, the counter K, which is equal to the number of load cycles performed, preferably is incremented by 1.
  • In [0050] step 407, the counter K preferably is compared to M, where M is the number of load cycles needed to load all the needed keys. If the counter K is equal to M, then the loading of the keys has been completed as indicated in step 408. If the counter K is less than M, then steps 404, 405 and 406 preferably are repeated to acquire the next key or key segment, and the counter K, after being incremented by 1, is compared once again with M. Hence, steps 404, 405, 406 and 407 are repeated in a loop until all the keys or key segments are loaded.
  • FIG. 5 is a block diagram of an encryption system within a DVD player in an embodiment according to the present invention. [0051] DVD data 501 from a DVD reader is input to a DVD data decoder 502. The DVD data 501 may include video data and/or multimedia data. The DVD data 501 may also include other data, such as, for example, graphics or closed caption information. The DVD data decoder 502 preferably decodes the DVD data 501 to generate digital video, multimedia and/or other data. A multiplexer 504 couples either the digital video from the DVD data decoder 502 or cryptographic keys from a key source 503 to a selector switch 510. The key source 503 may include any suitable storage medium for storing the cryptographic keys.
  • The [0052] selector switch 510 preferably provides the digital video, multimedia and/or other data for encryption to the encryptor 505 via a video port, which may also be referred to as a pixel port or a data port. The selector switch 510 preferably also provides the cryptographic keys to the encryptor 505 via a key port. The encryptor 506 preferably contains a register for storing the received cryptographic keys.
  • In other embodiments, the [0053] key source 503 may provide the cryptographic keys to a RAM external to the encryptor 505 via the multiplexer 504 and the selector switch 510 and not directly to the key port on the encryptor 505. In this case, the cryptographic keys may be stored in the RAM temporarily, and then loaded onto the register in the encryptor 505 via the key port as needed for encryption of the digital video, multimedia, and/or other data. The RAM may be implemented on the same integrated circuit chip as the encryptor 505.
  • After the encryption, the encrypted digital video, as well as the encrypted multimedia and/or other encrypted data, preferably is sent to a [0054] display link transmitter 506, which provides an output signal suitable for transmission over display link 507. The encrypted digital video, multimedia and/or other data preferably are encrypted in such a way that interception and/or decryption of the digital video, multimedia and/or other data preferably is prevented.
  • The operation of the system in FIG. 5 preferably is controlled by a [0055] controller 508 using a control bus 509. The control bus 509, for example, may include an I2C control bus or any other suitable control bus. The controller, for example, may include a finite state machine (FSM), a microprocessor, a micro controller, an ASIC or any other suitable device for controlling traffic on the control bus 509.
  • In other embodiments, the cryptographic keys may be loaded to either the RAM or directly to the [0056] encryptor 505 via the control bus 509, which may be an I2C control bus. In this case, since the cryptographic keys from the key source 503 do not have to share incoming data lines from the multiplexer 504 with the digital video, multimedia and/or other data, the multiplexer 504 and/or the selector switch 510 may not be needed.
  • The [0057] encryptor 505 may also encode video decryption keys and transmit over the display link to a digital display link receiver to be used for decryption of the encrypted digital video, multimedia and/or other data at the receiver side (e.g., display side). The encoded video decryption keys are decoded at the receiver side prior to the decryption of the encrypted digital video, multimedia and/or other data. The encoding and decoding of the cryptographic keys are described further in reference to FIG. 6.
  • FIG. 6 is a block diagram of a digital display link receiver including a [0058] decryptor 605 in an embodiment according to the present invention. Incoming serial data preferably arrives over a display link 601. The incoming serial data preferably includes encrypted digital video, multimedia and/or other data, and may have been transmitted over the display link 507 of FIG. 5.
  • During normal operation, the incoming serial data preferably is received by a [0059] display link receiver 602. The display link receiver 602 preferably converts the incoming serial data into a video data in parallel format and sends the parallel video data to the decryptor 605 via a switch 604. The display link receiver 602 may also extract multimedia and/or other data from the incoming serial data, and send to the decryptor 605 for decryption. The decryptor 605 preferably generates decrypted digital video 608, which may include decrypted multimedia and/or decrypted data, and sends it via physically secure internal wiring to a video display or monitor.
  • The operation of the system in FIG. 6 preferably is controlled by a [0060] controller 609 using a control bus 610. The control bus 610, for example, may include an I2C control bus or any other suitable control bus. The controller, for example, may include a finite state machine (FSM), a microprocessor, a micro controller, an ASIC or any other suitable device for controlling traffic on the control bus 610.
  • Prior to the start of decryption of the encrypted digital video, multimedia and/or other data, a public key system is used to cipher the video decryption keys, so that they can be sent via the digital display link to the [0061] decryptor 605. A public key preferably is loaded from a key source, such as, for example, the key source 503 of FIG. 5, into an encryptor, such as, for example the encryptor 505. A corresponding private key preferably is loaded from PROM 607 into RAM 606. The private key is used to decipher the video decryption keys sent from the display link transmitter in FIG. 5. The video decryption keys needed by the decryptor 605 preferably are provided by the key source and encrypted by the encryptor, and sent to the display link receiver in FIG. 6 during a startup procedure. In other embodiments, the private key may be loaded directly to a decryptor register from the PROM 607 via a key port of the decryptor 605 without being stored temporarily in RAM.
  • Public key cryptography is well known to those skilled in the art and the public key cryptography used in this embodiment is one example of the use of public key cryptography to protect the transmission of decryption keys to the receiver. In other embodiments, other cryptographic systems may be used to protect the keys during transmission to the receiver. For example, in one embodiment of the present invention DES (Data Encryption Standard) encoding and decoding may be used to encode and decode keys. [0062]
  • The display link receiver in FIG. 6 receives the ciphered video decryption keys on the [0063] display link 601. The ciphered video decryption keys are extracted by the display link receiver 602. The ciphered video decryption keys are input to the decryptor 605, which uses the private key stored in the PROM 607 to decipher the video decryption keys, which are then stored in the RAM 606. Once the RAM 606 has all the keys needed for video decryption, then the display link receiver is ready to start decrypting the encrypted video data sent by a display link transmitter, such as, for example, the display link transmitter 506 of FIG. 5.
  • The following list of events provides an overview of the initialization process performed at startup to load video decryption keys into the display link receiver: [0064]
  • Steps 2 to 6 take place in the display link transmitter. [0065] Steps 1, 7 to 9, 11 take place in the display link receiver:
  • 1. Load private key from the [0066] PROM 607 into the RAM 606.
  • 2. Load public key from the [0067] key source 503 into the encryptor 505.
  • 3. Load video decryption key from the [0068] key source 503 as data into the encryptor 505.
  • 4. Cipher the video decryption key using the public key loaded in the [0069] encryptor 505.
  • 5. Send the ciphered video decryption key to the [0070] display link transmitter 506.
  • 6. Transmit the ciphered video decryption key via the [0071] display link 507.
  • 7. Receive the ciphered video decryption key at the [0072] display link receiver 602.
  • 8. Decipher the ciphered video decryption key received from the [0073] display link transmitter 506 using private key from the PROM 607.
  • 9. Load the video decryption key into the [0074] RAM 606.
  • 10. Repeat steps 3 to 9 until all video decryption key segments or video decryption keys have been loaded into the [0075] RAM 606.
  • 11. Load the video decryption keys from the [0076] RAM 606 into the decryptor 605.
  • 12. Ready to start decrypting encrypted digital video. [0077]
  • In an alternate embodiment according to the present invention, a method for loading data encryption keys (which may also be referred to as video keys, data keys or cryptographic keys) into a digital display link transmitter or receiver is provided. In this embodiment, the data encryption keys preferably are encrypted and a control bus is used to send the encrypted data encryption keys to the transmitter or the receiver. The data encryption keys preferably are encrypted using an encryption key, which preferably is located closely to the source of the data encryption keys. The encrypted data encryption keys preferably are decrypted using a decryption key, which may be on the same integrated circuit as the digital display link transmitter or receiver. [0078]
  • A DVI (Digital Video Interface) system typically uses an I[0079] 2C control bus for sending control information between a DVI transmitter and a DVI receiver. In one embodiment of the invention, the I2C control bus in a DVI system can be used to send encrypted data encryption keys to a DVI transmitter and a DVI receiver.
  • Those skilled in the art would appreciate that there are a variety of cryptographic systems, which can be used to protect the data encryption keys. There are many cryptographic protocols, two of the best known being symmetric systems and public key systems. In symmetric systems, such as DES, the same key is used for encryption and decryption. In public key systems, such as RSA, the encryption key is public and the decryption key is private. [0080]
  • FIG. 7 is a block diagram of a cryptographic key distribution system for a digital display link transmitter in an embodiment according to the present invention. There are two systems shown in FIG. 7: a [0081] key source 701 and a display link transmitter 710. The display link transmitter 710 preferably is a digital transmitter, which transmits data in DVI format. In other embodiments, the display link transmitter 710 may also be an analog transmitter.
  • Those skilled in the art would appreciate that the [0082] key source 701 and the display link transmitter 710 can be in various different configurations. For example, the key source 701 and the display link transmitter 710 may be within a same physical device, such as a set-top box, or they could be in two or more separate physical systems. Further, those skilled in the art would appreciate that the key source 701 and/or the display link transmitter 710 may comprise additional components that are not illustrated in FIG. 7.
  • The [0083] key source 701 includes data encryption keys 702, which may be stored in memory. The data encryption keys 702 preferably are encrypted by a data key encryptor 704 using encryption keys 703, which may also be stored in memory. The encrypted data encryption keys preferably are sent to the display link transmitter 710 over a control bus 705, which may be an I2C control bus.
  • At the [0084] transmitter 710, the encrypted data encryption keys are received over the control bus 705. Then the encrypted data encryption keys preferably are decrypted by a data key decryptor 714 using decryption keys 715. The decryption keys 715 may be stored in memory, such as, for example, a Programmable Read Only Memory (PROM), which may be on the same integrated circuit (IC) or on the same printed circuit board (PCB) as the rest of the display link transmitter 710.
  • A [0085] data encryptor 712 uses the data encryption keys recovered by the data key decryptor 714 to encrypt digital data 711 to generate encrypted data 713. The encrypted data 713 is then ready for further processing and/or transmission by the display link transmitter 710. The digital data 711 may include one or more of, but is not limited to, multimedia, video, audio, web contents, graphics and text.
  • Most of the systems, subsystems and connections shown in FIG. 7 should be physically secured to protect the data and keys while in an unencrypted form. Further, the encrypted data encryption keys carried by the [0086] control bus 705 and the encrypted data 713 preferably are protected from eavesdropping through the respective encryption, and preferably do not require additional security measures.
  • FIG. 8 is a block diagram of a cryptographic key distribution system for sending encrypted data encryption keys from a [0087] computer system 801 to a display link transmitter 810 in an embodiment according to the present invention. The display link transmitter 810 preferably is a digital transmitter, which preferably transmits data in DVI format. In other embodiments, the display link transmitter 810 may be an analog transmitter.
  • Those skilled in the art would appreciate that the [0088] computer system 801 and the display link transmitter 810 may include other components in addition to the components illustrated in FIG. 8. Further, those skilled in the art would appreciate that the computer system 801 and the display link transmitter 810 may have various different configurations. For example, the computer system 801 and the display link transmitter 810 may be within the same physical device, such as a personal computer, or they may be in two or more physically separate devices.
  • The [0089] computer system 801 includes data encryption keys 802, which may be stored in memory and which preferably are encrypted by a data key encryptor 804 using encryption keys 803, which may also be stored in memory. The data key encryptor 804 preferably is implemented using software, but may be implemented using software, firmware, hardware or any combination thereof. For encryption of the data encryption keys, the data key encryptor 804 may work together with a microprocessor 807 of the computer system 801. For example, when the data key encryptor 804 is in a form of software, it may run on the microprocessor 807.
  • The encrypted data encryption keys preferably are sent to the [0090] display link transmitter 810 over a control bus 805, which may be an I2C control bus. At the display link transmitter 810, the encrypted data encryption keys are received over the control bus 805, and preferably are decrypted by a data key decryptor 814 using decryption keys 815. The decryption keys 815 may be stored in memory, such as, for example, a Programmable Read Only Memory (PROM), which may be on the same integrated circuit (IC) or on the same printed circuit board (PCB) as the rest of the display link transmitter 810.
  • A [0091] data encryptor 812 preferably uses the data encryption keys recovered by the data key decryptor 814 to encrypt digital data 811 to generate encrypted data 813. The encrypted data 813 is then ready for further processing in the display link receiver 810 and/or to be sent to a display link receiver. The digital data 811 may include one or more of, but is not limited to, multimedia, video, audio, web contents, graphics and text.
  • Most of the systems, subsystems and connections shown in FIG. 8 should be physically secured to protect data and keys while in an unencrypted form. The encrypted keys carried over the control bus [0092] 805 and the encrypted data 813 preferably are protected from eavesdropping through the respective encryption, and preferably do not require additional security measures.
  • FIG. 9 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a set-[0093] top box smartcard 906 to a display link transmitter 910 in an embodiment according to the present invention. The display link transmitter 910 preferably is a digital transmitter, which preferably transmits data in DVI format. In other embodiments, the display link transmitter 910 may be an analog transmitter. The systems shown in FIG. 9 represent a portion of the systems in a set-top box, which may include additional components not illustrated in FIG. 9.
  • An [0094] incoming cable signal 902 is processed by a cable tuner 903 to select a desired channel, which is sent to a cable signal decoder 904. The output of the cable signal decoder 904 is digital data 911, which is sent to the display link transmitter 910. The digital data 911 may contain video as well as other data, such as, for example, multimedia data. The multimedia data may include one or more of, but is not limited to, video, audio, web contents, graphics, text and other information. The display link transmitter 910, only a portion of which is shown in FIG. 9, preferably converts the incoming digital data 911 to encrypted data 913.
  • Prior to encrypting any of the [0095] digital data 911, encryption keys should be loaded into the display link transmitter 910. Encrypted data encryption keys preferably are loaded into the smartcard 906, and preferably are sent to the display link transmitter over a control bus 905 to the display link transmitter 910. The encrypted data encryption keys preferably are decrypted by a data key decryptor 914 using decryption keys 915. The decryption keys 915 may be stored in memory, such as, for example, a Programmable Read Only Memory (PROM), which may be on the same integrated circuit (IC) or on the same printed circuit board (PCB) as the rest of the display link transmitter 910. A data encryptor 912 preferably encrypts the digital data 911 into the encrypted data 913 using the data encryption keys generated by the data key decryptor 914.
  • Most of the various systems, subsystems and connections shown in FIG. 9 should be physically secured to protect data and keys while in an unencrypted form. The encrypted data encryption keys [0096] 907 carried over the control bus 905 and the encrypted data 913 preferably are protected from eavesdropping, and preferably do not require additional security measures.
  • FIG. 10 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a cable headend to a [0097] display link transmitter 1010 in an embodiment according to the present invention. The display link transmitter 1010 preferably is a digital transmitter, which preferably transmits data in DVI format. In other embodiments, the display link transmitter 1010 may be an analog transmitter. FIG. 10, for example, may represent a portion a set-top box. Those skilled in the art would appreciate that set-top boxes would include other components not illustrated in FIG. 10.
  • An [0098] incoming cable signal 1002 is processed by a cable tuner 1003 to select a desired channel, and a cable tuner output 1006 is sent to a cable signal decoder 1004. One output of the cable signal decoder 1004 is digital data 1011, which is sent to the display link transmitter 1010. A data encryptor 1012, which is a part of the display link transmitter 1010, preferably encrypts the digital data 1011 into encrypted data 1013.
  • Some channels of the [0099] incoming cable signal 1002 may carry premium content, such as HDTV movie signals (e.g., pay-per-view), which should be encrypted using data encryption (cryptographic) keys before they are sent from a set-top box to a display. The data encryption keys needed to encrypt the HDTV video may be downloaded from the cable headend. The data encryption keys in encrypted form may be downloaded using the same channel as the HDTV movie signals or using another channel. The cable signal decoder 1004 may extract the encrypted data encryption keys from the cable tuner output 1006.
  • Prior to the encryption of any [0100] digital data 1011, the encryption keys preferably are loaded into the transmitter 1010. The encrypted data encryption keys preferably are sent to the transmitter 1010 over a control bus 1005, which may be an I2C control bus. The encrypted data encryption keys preferably are decrypted by a data key decryptor 1014 using decryption keys 1015. The decryption keys 1015 may be stored in memory, such as, for example, a Programmable Read Only Memory (PROM), which may be on the same integrated circuit (IC) or on the same printed circuit board (PCB) as the rest of the display link transmitter 1010.
  • A [0101] data encryptor 1012 encrypts the digital data 1011 into encrypted data 1013 using the data encryption keys generated by the data key decryptor 1014. The digital data stream 1011 may also contain data other than the HDTV movie signals, such as, for example, video and multimedia data. The multimedia data may include one or more of, but is not limited to, video, audio, web contents, graphics, text and other information.
  • Most of the various systems, subsystems and connections shown in FIG. 10 should be physically secured to protect data and keys while in an unencrypted form. The encrypted data encryption keys carried over the [0102] control bus 1005 and the encrypted data 1013 preferably are protected from eavesdropping, and preferably do not require additional security measures.
  • FIG. 11 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a [0103] key source 1101 to a display link receiver 1110 in an embodiment according to the present invention. The display link receiver 1110 preferably is a digital receiver, which preferably receives data in DVI format. In other embodiments, the display link receiver may be an analog receiver. Those skilled in the art would appreciate that the key source 1101 and the data link receiver 1110 may include other components that are not illustrated in FIG. 11. Those skilled in the art would also appreciate that the key source 1101 and the data link receiver 1110 may have various different configurations. For example, the key source 1101 may be in a set-top box, a DVD player or a personal computer while the display link receiver 1110 may be in a digital monitor or an HDTV.
  • The [0104] key source 1101 preferably includes data decryption keys 1102, which may be stored in memory, and which preferably are encrypted by a data key encryptor 1104 using encryption keys 1103, which may also be stored in memory. The encrypted data encryption keys preferably are sent to the display link receiver 1110 over a control bus 1105, which may be an I2C bus. At the display link receiver 1110, the encrypted data encryption keys are received from the control bus 1105, and preferably are decrypted by a data key decryptor 1114 using decryption keys 1115, which may be stored in memory.
  • A [0105] data decryptor 1112 uses the data decryption keys generated by the data key decryptor 1114 to decrypt encrypted data 1111 to generate digital data 1113. The digital data 1113 is then ready for further processing by the display link receiver 1110 and/or transmission to a display device. The encrypted data may be received from a set-top box, a computer, a DVD player or any other video/data source that outputs data in an encrypted form. The encrypted data 1111 may include one or more of, but is not limited to, multimedia, video, audio, web contents, graphics, text or other data.
  • Most of the systems, subsystems and connections shown in FIG. 11 should be physically secured to protect data and keys while in an unencrypted form. The encrypted keys carried over the control bus [0106] 1105 and the encrypted data 1111 preferably are protected from eavesdropping, and preferably do not require additional security measures.
  • FIG. 12 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a cable headend to a [0107] display link transmitter 1212 and a display link receiver 1214 in an embodiment according to the present invention. For example, the cryptographic key distribution system of FIG. 12, for example, may include a part of a set-top box comprising a cable tuner 1203, a cable signal decoder 1204, the display link transmitter 1212 and the display link receiver 1214.
  • An [0108] incoming cable signal 1202 from the cable headend preferably is processed by the cable tuner 1203 to select a desired channel, which preferably is sent to the cable signal decoder 1204. One output of the cable signal decoder 1204 is digital data 1211, which is sent to the display link transmitter 1212. The display link transmitter 1212 preferably converts digital data 1211 to an encrypted data stream 1213. To this end, the display link transmitter 1212 may include a data encryptor similar to the data encryptor 1012 of FIG. 10.
  • The [0109] encrypted data 1213 preferably is introduced into the display link receiver 1214. The display link receiver 1214 may include a data decryptor similar to the data decryptor 1112 of FIG. 11. Digital data output 1215 of the display link receiver 1214 may be sent to a digital display. The display link receiver 1214 may be a part of the digital display so that the digital data 1215 is physically protected within the display system.
  • Some channels of the [0110] incoming cable signal 1202 may carry premium content, such as HDTV movie signals (e.g., pay-per-view), which should be encrypted before they are sent from the set-top box over a display link to a digital display. Data encryption keys used by the display link transmitter 1212 to encrypt the HDTV movie signals may be downloaded from the cable headend, using the same channel as the HDTV movie signals or using another channel. The cable signal decoder 1204 preferably extracts encrypted data encryption and decryption keys from the output of the cable tuner 1203.
  • Both the encrypted data encryption keys and the encrypted data decryption keys preferably are sent over a [0111] control bus 1205, which may be an I2C bus. The encrypted data encryption keys preferably are loaded to the display link transmitter 1212 from the control bus 1205, prior to encryption of any digital data 1211. The encrypted data decryption keys preferably are loaded to the display link receiver 1214 from the control bus 1205, prior to any decryption of the encrypted data 1213.
  • In addition to video such as HDTV movie signals, the [0112] digital data stream 1211 may also contain other data, such as, for example, multimedia data. The multimedia data may include one or more of, but is not limited to, video, audio, web contents, graphics, text and other information.
  • Most of the various systems, subsystems and connections shown in FIG. 12 should be physically secured to protect data and keys while in an unencrypted form. The encrypted keys carried over the [0113] control bus 1205 and the encrypted video data 1213 preferably are protected from eavesdropping, and preferably do not require additional security measures.
  • FIG. 13 is a block diagram of a cryptographic key distribution system for sending cryptographic keys from a cable headend to a [0114] display link transmitter 1311, a repeater 1313 and receivers in an alternate embodiment according to the present invention. The cryptographic key distribution system of FIG. 13, for example, may include a part of a set-top box including a cable tuner 1303, a cable signal decoder 1304 and a display link transmitter 1311.
  • An [0115] incoming cable signal 1302 from the cable headend is processed by the cable tuner 1303 to select a desired channel, which is sent to the cable signal decoder 1304. One output of the cable signal decoder 1304 is digital data 1310, which is provided to the display link transmitter 1311. The display link transmitter 1311 preferably converts the digital data 1310 to encrypted data, which is sent to the repeater 1313 via display link 1312. For such encryption, the display link transmitter 1311 may include a data encryptor similar to the data encryptor 1012 of FIG. 10.
  • The [0116] repeater 1313 preferably decrypts the incoming encrypted data and then encrypts the resulting digital data and sends it out to a receiver A (1315) and to a receiver B (1319) via display links 1314 and 1318, respectively. The receiver A (1315) preferably decrypts the incoming encrypted data and sends the resulting digital data to a display A (1317). The receiver B (1319) preferably decrypts the incoming encrypted data and sends the resulting digital data to a display B (1321).
  • Some channels of the [0117] incoming cable signal 1302 may carry premium content, such as HDTV movie signals (e.g., pay-per-view), which should be encrypted before they can be sent from a set-top box over a display link to a digital display. Data encryption and decryption keys used by the display link transmitter 1311, the repeater 1313 and the receivers A and B (1315, 1319) may be downloaded from the cable headend using the same channel as the HDTV movie signals or using another channel. The cable signal decoder 1304 preferably extracts the encrypted data encryption and decryption keys from the output of the cable tuner 1303.
  • The encrypted data encryption and decryption keys preferably are sent over a [0118] control bus 1305, which may be an I2C control bus. The encrypted data encryption keys preferably are loaded from the control bus 1305 into the display link transmitter 1311. The encrypted data decryption and encryption keys preferably are loaded from the control bus 1305 into the repeater 1313.
  • In an alternate embodiment according to the present invention, for example, the [0119] repeater 1313 preferably provides the encrypted data decryption keys from the control bus 1305 to the display link receivers A and B (1315, 1319). The repeater 1313 may provide the encrypted data decryption keys to the display link receiver A (1315) over a control bus (not shown) between them. The repeater 1313 may also provide the encrypted data decryption keys to the display link receiver B (1319) over a control bus (not shown) between them. In other alternate embodiments, the display link receivers A and B (1315, 1319) may receive the encrypted data decryption keys directly from the control bus 1305.
  • The [0120] digital data 1310 may also contain data other than video including HDTV movie signals, such as, for example, multimedia data. The multimedia data may include one or more of, but is not limited to, video, audio, web contents, graphics, text and other information.
  • Most of the various systems, subsystems and connections shown in FIG. 13 should be physically secured to protect data and keys while in an unencrypted form. The encrypted keys carried over the [0121] control bus 1305 and the encrypted data 1312, 1314 and 1318 preferably are protected from eavesdropping, and preferably do not require additional security measures.
  • Although this invention has been described in certain specific embodiments, many additional modifications and variations would be apparent to those skilled in the art. It is therefore to be understood that this invention may be practiced otherwise than as specifically described. Thus, the present embodiments of the invention should be considered in all respects as illustrative and not restrictive, the scope of the invention to be determined by the appended claims and their equivalents. [0122]

Claims (40)

We claim:
1. A system for distributing a cryptographic key for encrypting digital data, the system comprising:
a key source for storing the cryptographic key, encrypting the cryptographic key, and for transmitting the encrypted cryptographic key over a control bus; and
a transmitter for receiving the digital data, receiving the encrypted cryptographic key over the control bus, decrypting the encrypted cryptographic key to recover the cryptographic key, encrypting the digital data using the cryptographic key to generate encrypted data, and for transmitting the encrypted data.
2. The system for distributing a cryptographic key according to claim 1, wherein the key source comprises a first memory for storing the cryptographic key, a second memory for storing an encryption key, and a key encryptor for encrypting the cryptographic key using the encryption key.
3. The system for distributing a cryptographic key according to claim 1, wherein the transmitter comprises a memory for storing a decryption key, a key decryptor for decrypting the encrypted cryptographic key using the decryption key, and a data encryptor for encrypting the digital data using the cryptographic key.
4. The system for distributing a cryptographic key according to claim 1, wherein the key source and the transmitter are included in at least two physically separate devices.
5. The system for distributing a cryptographic key according to claim 1, wherein the control bus is an I2C control bus.
6. The system for distributing a cryptographic key according to claim 1, wherein the cryptographic key is encrypted and decrypted using a symmetric system where the encryption key is identical to the decryption key.
7. The system for distributing a cryptographic key according to claim 6, wherein the symmetric system is a Data Encryption Standard (DES) system.
8. The system for distributing a cryptographic key according to claim 1, wherein the cryptographic key is encrypted and decrypted using a public key system where the encryption key is public and the decryption key is private.
9. The system for distributing a cryptographic key according to claim 8, wherein the public key system is a RSA system.
10. The system for distributing a cryptographic key according to claim 1, wherein the digital data comprises multimedia data, video, audio, web content, graphics or text.
11. The system for distributing a cryptographic key according to claim 1, wherein the key source is a computer system comprising a first memory for storing the cryptographic key, a second memory for storing an encryption key, a key encryptor for encrypting the cryptographic key using the encryption key, and a microprocessor working together with the key encryptor to encrypt the cryptographic key.
12. The system for distributing a cryptographic key according to claim 11, wherein the key encryptor is implemented as software running on the microprocessor.
13. The system for distributing a cryptographic key according to claim 11, wherein the key encryptor is implemented using a firmware or a hardware.
14. The system for distributing a cryptographic key according to claim 1, wherein the key source and the transmitter are included in a computer.
15. The system for distributing a cryptographic key according to claim 1, wherein the key source and the transmitter are included in a set-top box.
16. A set-top box for distributing a cryptographic key for encrypting digital data, the set-top box comprising:
a cable tuner for receiving a cable signal from cable headend and for selecting a channel of the cable signal;
a cable signal decoder for receiving the channel and for outputting content of the channel as the digital data;
a smart card for storing the cryptographic key in an encrypted form, and for transmitting the encrypted cryptographic key over a control bus; and
a transmitter for receiving the digital data, receiving the encrypted cryptographic key over the control bus, decrypting the encrypted cryptographic key to generate the cryptographic key, encrypting the digital data using the cryptographic key to generate encrypted data, and for transmitting the encrypted data.
17. The set-top box for distributing a cryptographic key according to claim 16, wherein the transmitter comprises a memory for storing a decryption key, a key decryptor for decrypting the encrypted cryptographic key using the decryption key, and a data encryptor for encrypting the digital data using the cryptographic key.
18. The set-top box for distributing a cryptographic key according to claim 16, wherein the smart card is removably coupled within the set-top box and with the control bus, whereby the smart card can be replaced with another smart card.
19. A set-top box for distributing a cryptographic key for encrypting digital data, the set-top box comprising:
a cable tuner for receiving a cable signal from cable headend, and for selecting one or more channels of the cable signal;
a cable signal decoder for receiving the channels, for exatracting the cryptographic key in an encrypted form from the channels, for extracting the digital data from the channels, and for transmitting the encrypted cryptographic key over a control bus; and
a transmitter for receiving the digital data, receiving the encrypted cryptographic key over the control bus, decrypting the encrypted cryptographic key to recover the cryptographic key, encrypting the digital data using the cryptographic key to generate encrypted data, and for transmitting the encrypted data.
20. The set-top box for distributing a cryptographic key according to claim 19, wherein the digital data and the encrypted cryptographic key are included in same channel of the cable signal.
21. The set-top box for distributing a cryptographic key according to claim 19, wherein the digital data and the encrypted cryptographic key are included in different channels of the cable signal.
22. The set-top box for distributing a cryptographic key according to claim 19, wherein the digital data comprises HDTV movie signals.
23. A system for distributing a cryptographic key for decrypting encrypted data, the system comprising:
a key source for storing the cryptographic key, encrypting the cryptographic key, and for transmitting the encrypted cryptographic key over a control bus; and
a receiver for receiving the encrypted data, receiving the encrypted cryptographic key over the control bus, decrypting the encrypted cryptographic key to recover the cryptographic key, decrypting the encrypted data using the cryptographic key to generate digital data, and for transmitting the digital data.
24. The system for distributing a cryptographic key according to claim 23, wherein the key source comprises a first memory for storing the cryptographic key, a second memory for storing an encryption key, and a key encryptor for encrypting the cryptographic key using the encryption key.
25. The system for distributing a cryptographic key according to claim 23, wherein the receiver comprises a memory for storing a decryption key, a key decryptor for decrypting the encrypted cryptographic key using the decryption key, and a data decryptor for decrypting the encrypted data using the cryptographic key.
26. The system for distributing a cryptographic key according to claim 23, wherein receiver is included in a digital display, and the key source is included in a settop box, a DVD player or a computer.
27. A system for distributing cryptographic keys for encrypting digital data and for decrypting encrypted data, the set-top box comprising:
a cable tuner for receiving a cable signal from cable headend, and for selecting one or more channels of the cable signal;
a cable signal decoder for receiving the channels, for exatracting first and second cryptographic keys in an encrypted form from the channels, for extracting the digital data from the channels, and for transmitting the encrypted first cryptographic key and the encrypted second cryptographic key over a control bus;
a transmitter for receiving the digital data, receiving the encrypted first cryptographic key over the control bus, decrypting the encrypted first cryptographic key to generate the first cryptographic key, encrypting the digital data using the first cryptographic key to generate the encrypted data, and for transmitting the encrypted data; and
a receiver for receiving the encrypted data, receiving the encrypted second cryptographic key over the control bus, decrypting the encrypted second cryptographic key to generate the second cryptographic key, decrypting the encrypted data using the second cryptographic key to recover the digital data, and for transmitting the digital data.
28. The system for distributing cryptographic keys according to claim 27, wherein the receiver is included in a digital display, and the cable tuner, the cable signal decoder and the transmitter are a included in a set-top box.
29. The system for distributing cryptographic keys according to claim 27, the system further comprising a repeater for receiving the encrypted data from the transmitter, receiving the encrypted first and second cryptographic keys over the control bus, decrypting the encrypted first and second cryptographic keys to generate first and second cryptographic keys, respectively, decrypting the encrypted data using the second cryptographic key to generate the digital data, encrypting the digital data using the first cryptographic key to generate the encrypted data, and for transmitting the encrypted data to the receiver.
30. A method of distributing a cryptographic key for encrypting digital data, the method comprising the steps of:
storing the cryptographic key in a key source;
encrypting the cryptographic key in the key source to generate an encrypted cryptographic key;
transmitting the encrypted cryptographic key from the key source over a control bus;
loading the encrypted cryptographic key into a transmitter from the control bus;
decrypting the encrypted cryptographic key in the transmitter to recover the cryptographic key;
introducing the digital data into the transmitter;
encrypting the digital data using the recovered cryptographic key to generate encrypted data; and
transmitting the encrypted data from the transmitter.
31. The method of distributing a cryptographic key according to claim 30, wherein the key source and the transmitter are included in at least two physically separate devices.
32. The method of distributing a cryptographic key according to claim 30, wherein both the key source and the transmitter are included in a computer, set-top box, or a DVD player.
33. A method of distributing a cryptographic key for encrypting digital data, the method comprising the steps of:
storing the cryptographic key in an encrypted form in a smart card;
installing the smart card inside a set-top box;
receiving a cable signal from cable headend into the set-top box;
selecting a channel of the cable signal, the channel including the digital data;
decrypting the encrypted cryptographic key to generate the cryptographic key;
encrypting the digital data using the cryptographic key to generate encrypted data; and
transmitting the encrypted data from the set-top box.
34. A method of distributing a cryptographic key for encrypting digital data, the method comprising the steps of:
receiving a cable signal from cable headend into a set-top box;
selecting one or more channels of the cable signal;
extracting the digital data from the channels;
extracting an encrypted cryptographic key from the channels;
decrypting the encrypted cryptographic key to generate the cryptographic key;
encrypting the digital data using the cryptographic key to generate encrypted data; and
transmitting the encrypted data from the set-top box.
35. The method of distributing a cryptographic key according to claim 34, wherein the digital data and the encrypted cryptographic key are included in same channel.
36. The method of distributing a cryptographic key according to claim 34, wherein the digital data and the encrypted cryptographic key are included in different channels.
37. A method of distributing a cryptographic key for decrypting encrypted data, the method comprising the steps of:
storing the cryptographic key in a key source;
encrypting the cryptographic key in the key source to generate an encrypted cryptographic key;
transmitting the encrypted cryptographic key from the key source over a control bus;
loading the encrypted cryptographic key into a receiver from the control bus;
decrypting the encrypted cryptographic key in the receiver to recover the cryptographic key;
introducing the encrypted data into the receiver;
decrypting the encrypted data using the recovered cryptographic key to generate decrypted data; and
transmitting the decrypted data from the receiver.
38. The method according to claim 37, wherein the receiver is included in a digital display, and the key source is included in a set-top box, a DVD player or a computer.
39. A method of distributing cryptographic keys for encrypting digital data and decrypting encrypted data, the method comprising the steps of:
receiving a cable signal from cable headend into a set-top box, the set-top box;
selecting one or more channels of the cable signal;
extracting the digital data from the channels;
extracting encrypted first and second cryptographic keys from the channels;
transmitting the encrypted first and second cryptographic keys over a control bus;
decrypting the encrypted first cryptographic key to generate a first cryptographic key;
encrypting the digital data using the first cryptographic key to generate the encrypted data;
transmitting the encrypted data from the set-top box;
receiving the encrypted data into a receiver;
loading the encrypted second cryptographic key into the receiver from the control bus;
decrypting the encrypted second cryptographic key to generate a second cryptographic key;
decrypting the encrypted data using the second cryptographic key to recover the digital data; and
outputting the digital data from the receiver.
40. The method of distributing cryptographic keys of claim 39, the method further comprising the steps of:
receiving the encrypted data from the set-top box into a repeater;
loading the encrypted first and second cryptographic keys into the repeater from the control bus;
decrypting the encrypted first and second cryptographic keys in the repeater to generate the first and second cryptographic keys;
decrypting the encrypted data using the second cryptographic key in the repeater to recover the digital data;
encrypting the recovered digital data using the first cryptographic key in the repeater to regenerate the encrypted data;
transmitting the encrypted data from the repeater to the receiver.
US09/991,081 2000-04-28 2001-11-16 Cryptographic key distribution system and method for digital video systems Abandoned US20020037081A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US09/991,081 US20020037081A1 (en) 2000-04-28 2001-11-16 Cryptographic key distribution system and method for digital video systems
EP02090377A EP1326447A1 (en) 2001-11-16 2002-11-14 Cryptographic key distribution system and method for digital video
US11/593,872 US7945047B2 (en) 2000-04-28 2006-11-07 Cryptographic key distribution system and method for digital video systems

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US20019400P 2000-04-28 2000-04-28
US09/844,898 US20020003878A1 (en) 2000-04-28 2001-04-27 Cryptographic key distribution system and method for digital video systems
US09/991,081 US20020037081A1 (en) 2000-04-28 2001-11-16 Cryptographic key distribution system and method for digital video systems

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/844,898 Continuation-In-Part US20020003878A1 (en) 2000-04-28 2001-04-27 Cryptographic key distribution system and method for digital video systems

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/593,872 Continuation US7945047B2 (en) 2000-04-28 2006-11-07 Cryptographic key distribution system and method for digital video systems

Publications (1)

Publication Number Publication Date
US20020037081A1 true US20020037081A1 (en) 2002-03-28

Family

ID=25536851

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/991,081 Abandoned US20020037081A1 (en) 2000-04-28 2001-11-16 Cryptographic key distribution system and method for digital video systems
US11/593,872 Expired - Fee Related US7945047B2 (en) 2000-04-28 2006-11-07 Cryptographic key distribution system and method for digital video systems

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/593,872 Expired - Fee Related US7945047B2 (en) 2000-04-28 2006-11-07 Cryptographic key distribution system and method for digital video systems

Country Status (2)

Country Link
US (2) US20020037081A1 (en)
EP (1) EP1326447A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020141577A1 (en) * 2001-03-29 2002-10-03 Ripley Michael S. Method and system for providing bus encryption based on cryptographic key exchange
US20040064694A1 (en) * 2002-09-27 2004-04-01 Lee David A. Method and apparatus for augmenting authentication in a cryptographic system
US20050010611A1 (en) * 2003-07-09 2005-01-13 Hitachi Global Storage Technologies Multimedia storage device having digital write-only area
US20050138654A1 (en) * 2003-12-23 2005-06-23 Minne Mark W. Digital content distribution system
US20050169470A1 (en) * 2002-05-10 2005-08-04 Tsutomu Shimosato Encryption device and decryption device
US20060053471A1 (en) * 2004-09-09 2006-03-09 Texas Instruments Incorporated System and method for transporting an ancillary data packet in the active area of a video stream
US20060184791A1 (en) * 2005-02-14 2006-08-17 Schain Mariano R Encryption/decryption mechanism of network deployed executable image for secure boot of a device embedded in an un-trusted host
US20070297603A1 (en) * 2003-04-13 2007-12-27 Josh Kamins System for Securing Access to Data Streams
US7499545B1 (en) * 2001-02-05 2009-03-03 Ati Technologies, Inc. Method and system for dual link communications encryption
US20100241872A1 (en) * 2009-03-20 2010-09-23 Cisco Technology, Inc. Partially Reversible Key Obfuscation
US20100333131A1 (en) * 2009-06-30 2010-12-30 Echostar Technologies L.L.C. Apparatus systems and methods for securely sharing content with a plurality of receiving devices
US20110013773A1 (en) * 2009-07-15 2011-01-20 Pinder Howard G Use of copyright text in key derivation function
US7937595B1 (en) * 2003-06-27 2011-05-03 Zoran Corporation Integrated encryption/decryption functionality in a digital TV/PVR system-on-chip
US8968080B1 (en) * 2010-11-05 2015-03-03 Wms Gaming, Inc. Display of third party content on a wagering game machine
US9101343B2 (en) 2012-08-03 2015-08-11 Thach Buu Duong Therapeutic cryoablation system
US10127389B1 (en) * 2015-03-30 2018-11-13 Amazon Technologies, Inc. Performing operations on intelligent storage with hardened interfaces
CN112069551A (en) * 2019-06-11 2020-12-11 意法半导体(鲁塞)公司 Electronic circuit
US11163854B2 (en) * 2016-12-14 2021-11-02 Microsoft Technology Licensing, Llc Encoding optimization for obfuscated media
US11632415B2 (en) 2004-03-23 2023-04-18 Ioengine, Llc Apparatus, method and system for a tunneling client access point

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1975831A1 (en) * 2007-03-27 2008-10-01 Thomson Licensing, Inc. Device and method for digital processing management of content so as to enable an imposed work flow
US20100067693A1 (en) * 2008-09-17 2010-03-18 Dolby Laboratories Licensing Corporation System and method of enabling content output on a digital device
US10142108B2 (en) * 2013-06-17 2018-11-27 Qube Cinema, Inc. Copy protection scheme for digital audio and video content authenticated HDCP receivers
CN103716157B (en) * 2013-12-13 2017-01-25 厦门市美亚柏科信息股份有限公司 Grouped multiple-key encryption method and grouped multiple-key encryption device
CN106384025A (en) * 2016-11-29 2017-02-08 首影科技(深圳)有限公司 Display system and method for safely issuing and displaying content

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4807284A (en) * 1986-09-24 1989-02-21 Ncr Corporation Security device for sensitive data
US4849927A (en) * 1987-06-12 1989-07-18 Ncr Corporation Method of controlling the operation of security modules
US5237610A (en) * 1990-02-01 1993-08-17 Scientific-Atlanta, Inc. Independent external security module for a digitally upgradeable television signal decoder
US6101255A (en) * 1997-04-30 2000-08-08 Motorola, Inc. Programmable cryptographic processing system and method
US6223285B1 (en) * 1997-10-24 2001-04-24 Sony Corporation Of Japan Method and system for transferring information using an encryption mode indicator
US20030009669A1 (en) * 2000-03-06 2003-01-09 White Mark Andrew George Method and system to uniquely associate multicast content with each of multiple recipients
US6577734B1 (en) * 1995-10-31 2003-06-10 Lucent Technologies Inc. Data encryption key management system
US6590981B2 (en) * 2000-02-22 2003-07-08 Zyfer, Inc. System and method for secure cryptographic communications

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6789197B1 (en) 1994-10-27 2004-09-07 Mitsubishi Corporation Apparatus for data copyright management system
JP3176030B2 (en) 1996-01-08 2001-06-11 株式会社東芝 Copy control method and copy control device
US5915018A (en) 1996-11-05 1999-06-22 Intel Corporation Key management system for DVD copyright management
US5818939A (en) 1996-12-18 1998-10-06 Intel Corporation Optimized security functionality in an electronic system
US5923754A (en) 1997-05-02 1999-07-13 Compaq Computer Corporation Copy protection for recorded media
EP0994599A4 (en) 1998-04-01 2009-06-03 Panasonic Corp Data transmitting/receiving method, data transmitter, data receiver, data transmitting/receiving system, av content transmitting method, av content receiving method, av content transmitter, av content receiver, and program recording medium
MY132414A (en) 1998-04-14 2007-10-31 Hitachi Ltd Reproducing apparatus, recording apparatus and display apparatus
JP3951464B2 (en) 1998-07-28 2007-08-01 株式会社日立製作所 Digital signal processor
US6229895B1 (en) 1999-03-12 2001-05-08 Diva Systems Corp. Secure distribution of video on-demand
US7124938B1 (en) * 1999-03-24 2006-10-24 Microsoft Corporation Enhancing smart card usage for associating media content with households
US6845450B1 (en) 2000-02-25 2005-01-18 Genesis Microchip Inc. Display unit storing and using a cryptography key
WO2001084836A2 (en) * 2000-04-28 2001-11-08 Broadcom Corporation Cryptographic key distribution system and method for digital video systems
US6985591B2 (en) 2001-06-29 2006-01-10 Intel Corporation Method and apparatus for distributing keys for decrypting and re-encrypting publicly distributed media

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4807284A (en) * 1986-09-24 1989-02-21 Ncr Corporation Security device for sensitive data
US4849927A (en) * 1987-06-12 1989-07-18 Ncr Corporation Method of controlling the operation of security modules
US5237610A (en) * 1990-02-01 1993-08-17 Scientific-Atlanta, Inc. Independent external security module for a digitally upgradeable television signal decoder
US6577734B1 (en) * 1995-10-31 2003-06-10 Lucent Technologies Inc. Data encryption key management system
US6101255A (en) * 1997-04-30 2000-08-08 Motorola, Inc. Programmable cryptographic processing system and method
US6223285B1 (en) * 1997-10-24 2001-04-24 Sony Corporation Of Japan Method and system for transferring information using an encryption mode indicator
US6590981B2 (en) * 2000-02-22 2003-07-08 Zyfer, Inc. System and method for secure cryptographic communications
US20030009669A1 (en) * 2000-03-06 2003-01-09 White Mark Andrew George Method and system to uniquely associate multicast content with each of multiple recipients

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7499545B1 (en) * 2001-02-05 2009-03-03 Ati Technologies, Inc. Method and system for dual link communications encryption
US20020141577A1 (en) * 2001-03-29 2002-10-03 Ripley Michael S. Method and system for providing bus encryption based on cryptographic key exchange
US20050169470A1 (en) * 2002-05-10 2005-08-04 Tsutomu Shimosato Encryption device and decryption device
US7756270B2 (en) * 2002-05-10 2010-07-13 Sony Corporation Encryption device and decryption device
US7600118B2 (en) * 2002-09-27 2009-10-06 Intel Corporation Method and apparatus for augmenting authentication in a cryptographic system
US20040064694A1 (en) * 2002-09-27 2004-04-01 Lee David A. Method and apparatus for augmenting authentication in a cryptographic system
DE10393259B4 (en) * 2002-09-27 2010-07-15 Intel Corporation, Santa Clara Method and device for improving authentication in a cryptographic system
US8755523B2 (en) 2003-04-13 2014-06-17 Cisco Technology Inc. System for securing access to data streams
US20070297603A1 (en) * 2003-04-13 2007-12-27 Josh Kamins System for Securing Access to Data Streams
US20110103582A1 (en) * 2003-04-13 2011-05-05 Nds Limited System for securing access to data streams
US7937595B1 (en) * 2003-06-27 2011-05-03 Zoran Corporation Integrated encryption/decryption functionality in a digital TV/PVR system-on-chip
US7076625B2 (en) * 2003-07-09 2006-07-11 Hitachi Global Storage Technologies Multimedia storage device having digital write-only area
CN100447879C (en) * 2003-07-09 2008-12-31 日立环球储存科技荷兰有限公司 Multimedia storage device having digital write-only area
US20050010611A1 (en) * 2003-07-09 2005-01-13 Hitachi Global Storage Technologies Multimedia storage device having digital write-only area
US20050138654A1 (en) * 2003-12-23 2005-06-23 Minne Mark W. Digital content distribution system
US7594109B2 (en) * 2003-12-23 2009-09-22 Hewlett-Packard Development Company, L.P. Digital content distribution system
US11818194B2 (en) 2004-03-23 2023-11-14 Ioengine, Llc Apparatus, method and system for a tunneling client access point
US11632415B2 (en) 2004-03-23 2023-04-18 Ioengine, Llc Apparatus, method and system for a tunneling client access point
US11818195B1 (en) 2004-03-23 2023-11-14 Ioengine, Llc Apparatus, method and system for a tunneling client access point
US8724023B2 (en) * 2004-09-09 2014-05-13 Texas Instruments Incorporated System and method for transporting an ancillary data packet in the active area of a video stream
US20060053471A1 (en) * 2004-09-09 2006-03-09 Texas Instruments Incorporated System and method for transporting an ancillary data packet in the active area of a video stream
US20060184791A1 (en) * 2005-02-14 2006-08-17 Schain Mariano R Encryption/decryption mechanism of network deployed executable image for secure boot of a device embedded in an un-trusted host
US8130949B2 (en) 2009-03-20 2012-03-06 Cisco Technology, Inc. Partially reversible key obfuscation
US20100241872A1 (en) * 2009-03-20 2010-09-23 Cisco Technology, Inc. Partially Reversible Key Obfuscation
US8458742B2 (en) * 2009-06-30 2013-06-04 Echostar Technologies L.L.C. Apparatus systems and methods for securely sharing content with a plurality of receiving devices
US9118936B2 (en) * 2009-06-30 2015-08-25 EchoStar Technologies, L.L.C. Apparatus systems and methods for securely sharing content with a plurality of receiving devices
US20150334468A1 (en) * 2009-06-30 2015-11-19 Echostar Technologies L.L.C. Apparatus systems and methods for securely sharing content with a plurality of receiving devices
US9571894B2 (en) * 2009-06-30 2017-02-14 Echostar Technologies L.L.C. Apparatus systems and methods for securely sharing content with a plurality of receiving devices
US20130239135A1 (en) * 2009-06-30 2013-09-12 Echostar Technologies L.L.C. Apparatus systems and methods for securely sharing content with a plurality of receiving devices
US20100333131A1 (en) * 2009-06-30 2010-12-30 Echostar Technologies L.L.C. Apparatus systems and methods for securely sharing content with a plurality of receiving devices
US20110013773A1 (en) * 2009-07-15 2011-01-20 Pinder Howard G Use of copyright text in key derivation function
US8229115B2 (en) * 2009-07-15 2012-07-24 Cisco Technology, Inc. Use of copyright text in key derivation function
US8968080B1 (en) * 2010-11-05 2015-03-03 Wms Gaming, Inc. Display of third party content on a wagering game machine
US9101343B2 (en) 2012-08-03 2015-08-11 Thach Buu Duong Therapeutic cryoablation system
US10127389B1 (en) * 2015-03-30 2018-11-13 Amazon Technologies, Inc. Performing operations on intelligent storage with hardened interfaces
US10503917B2 (en) * 2015-03-30 2019-12-10 Amazon Technologies, Inc. Performing operations on intelligent storage with hardened interfaces
US20190080099A1 (en) * 2015-03-30 2019-03-14 Amazon Technologies, Inc. Performing operations on intelligent storage with hardened interfaces
US11163854B2 (en) * 2016-12-14 2021-11-02 Microsoft Technology Licensing, Llc Encoding optimization for obfuscated media
US11328098B2 (en) * 2019-06-11 2022-05-10 Stmicroelectronics (Rousset) Sas Electronic circuit
CN112069551A (en) * 2019-06-11 2020-12-11 意法半导体(鲁塞)公司 Electronic circuit

Also Published As

Publication number Publication date
EP1326447A1 (en) 2003-07-09
US7945047B2 (en) 2011-05-17
US20070116294A1 (en) 2007-05-24

Similar Documents

Publication Publication Date Title
US7945047B2 (en) Cryptographic key distribution system and method for digital video systems
KR100314774B1 (en) Apparatus, method and computer program product for protecting copyright data within a computer system
US9210382B2 (en) Method and apparatus for protecting the transfer of data
US7730300B2 (en) Method and apparatus for protecting the transfer of data
JP4716866B2 (en) Mechanisms for protecting the transfer of digital content
US7336785B1 (en) System and method for copy protecting transmitted information
US6668324B1 (en) System and method for safeguarding data within a device
JP4375995B2 (en) Device key protection method, encryption device and decryption device that can use the method, video transmission device, and video reception device
TWI387293B (en) Process and system for reception of a multimedia signal, cryptographic entity for this reception process and system, process and black box for the production of the cryptographic entity
US7499545B1 (en) Method and system for dual link communications encryption
US8737611B2 (en) Encryption device and medium, decryption device and method, data delivery device, data receiving device, and data delivery system
JP3998178B2 (en) Content copyright protection device and program thereof
US20020003878A1 (en) Cryptographic key distribution system and method for digital video systems
Lomb et al. Decrypting HDCP-protected video streams using reconfigurable hardware
JP4671602B2 (en) How to safely process digital signals
EP1563637B1 (en) Mechanism for protecting the transfer of digital content
JP4932155B2 (en) Tamper protection when sending keys
KR20050119416A (en) Device key protection method, and encoding apparatus, decoding apparatus, video transmission apparatus and video receiving apparatus using the method

Legal Events

Date Code Title Description
AS Assignment

Owner name: BROADCOM CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROGOFF, DAVID;PETILLI, STEVEN;REEL/FRAME:012325/0773;SIGNING DATES FROM 20011027 TO 20011031

AS Assignment

Owner name: JPMORGAN CHASE BANK, AS COLLATERAL AGENT, NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNOR:SEAGATE TECHNOLOGY LLC;REEL/FRAME:013177/0001

Effective date: 20020513

Owner name: JPMORGAN CHASE BANK, AS COLLATERAL AGENT,NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNOR:SEAGATE TECHNOLOGY LLC;REEL/FRAME:013177/0001

Effective date: 20020513

AS Assignment

Owner name: SEAGATE TECHNOLOGY LLC,CALIFORNIA

Free format text: RELEASE OF SECURITY INTERESTS IN PATENT RIGHTS;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT (FORMERLY KNOWN AS THE CHASE MANHATTAN BANK AND JPMORGAN CHASE BANK);REEL/FRAME:016926/0342

Effective date: 20051130

Owner name: SEAGATE TECHNOLOGY LLC, CALIFORNIA

Free format text: RELEASE OF SECURITY INTERESTS IN PATENT RIGHTS;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT (FORMERLY KNOWN AS THE CHASE MANHATTAN BANK AND JPMORGAN CHASE BANK);REEL/FRAME:016926/0342

Effective date: 20051130

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001

Effective date: 20160201

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001

Effective date: 20160201

AS Assignment

Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD., SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001

Effective date: 20170120

Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001

Effective date: 20170120

AS Assignment

Owner name: BROADCOM CORPORATION, CALIFORNIA

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:041712/0001

Effective date: 20170119