WO2010106518A1 - Method and system for controlling distributed set top boxes - Google Patents
Method and system for controlling distributed set top boxes Download PDFInfo
- Publication number
- WO2010106518A1 WO2010106518A1 PCT/IB2010/051185 IB2010051185W WO2010106518A1 WO 2010106518 A1 WO2010106518 A1 WO 2010106518A1 IB 2010051185 W IB2010051185 W IB 2010051185W WO 2010106518 A1 WO2010106518 A1 WO 2010106518A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- application module
- devices
- module
- mutated
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 230000035772 mutation Effects 0.000 claims description 18
- 230000002452 interceptive effect Effects 0.000 description 17
- 238000010586 diagram Methods 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000011144 upstream manufacturing Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 229910052710 silicon Inorganic materials 0.000 description 1
- 239000010703 silicon Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
- H04N21/4181—External card to be used in combination with the client device, e.g. for conditional access for conditional access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/438—Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving encoded video stream packets from an IP network
- H04N21/4385—Multiplex stream processing, e.g. multiplex stream decrypting
- H04N21/43853—Multiplex stream processing, e.g. multiplex stream decrypting involving multiplex stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
Definitions
- This invention relates to a method and system for controlling a receiving device for encrypted broadcast services at a user station. More particularly, the invention relates to a method and system for controlling a set-top box connected to a television monitor at a user station.
- smart cards for set-top boxes or the like intended to be connected to television (TV) sets and to decode encrypted services broadcasted from one or more head-ends, are cloned by unauthorized parties and the cloned cards are sold to customers. These cloned smart cards may then be used with genuine boxes by pirate viewers. These viewers are then in a position to receive and view the services without paying a subscription or paying a discounted subscription to the unauthorized parties. It will be appreciated that these unauthorized parties and pirate viewers cause serious damage for, amongst others, the service broadcasters.
- a method of controlling at (east one of a plurality of distributed receiving devices for encrypted broadcast services comprising the steps of: broadcasting to the at least one device an application module comprising an application code part, a business rules part and an application data part; sequentially mutating the application module by changing at least one of the application code part, the business rules part and the application data part;
- the receiving device may comprise a wireless receiver, which may be a satellite receiver or terrestrial receiver.
- the receiving device may comprise at least one decoder and a respective key token, such as a smart card, for decoding encrypted service data broadcasted by a broadcasting head-end.
- the application module is broadcasted to n devices and a first mutation of the application module is executed by m devices selected from the n devices and wherein m ⁇ n.
- the first mutation may be generated in response to response data received from the selected devices, or users of the selected devices.
- the first mutation may comprise an application data part which is different from the application data part of the application module.
- the first mutation may comprise a business rules part which is different from the business rules part of the application module.
- the response data from each selected device may comprise data relating to a unique address associated with the device.
- a system for controlling at least one of a plurality of distributed receiving devices for encrypted broadcast services comprising: a broadcast head-end comprising a server, a database and a transmitter; an application module mutating tool connected to the head-end, the tool being configured to generate an application module comprising an application code part, an application data part and a business rule part and the tool further being configured to mutate the application module by changing at least one of the application code part, the application data part and the business rules part; the head end being configured sequentially to broadcast the application module and at least part of the mutated application modules; and the plurality of receiving devices being configured to receive the application module and a processor of each device being configured sequentially to execute the application module and at least one mutated application module and to cause the device to operate in accordance with the application module and the at least one mutated application module.
- figure 1 is a diagrammatic representation of a broadcasting system comprising a plurality of distributed receiving devices for encrypted broadcast services
- figure 2 is a diagrammatic representation of relevant parts of the receiving device and an application module hosted on the device
- figure 3 is a diagrammatic representation of relevant parts of a mutating application which in use is intermittently mutated and broadcasted to the receiving devices
- figure 4 is a similar diagram of the module in compiled form
- figures 5 (a) to (c) are diagrammatic representations of the application module communicating with a hardware platform of the receiving device via an operating system running on the hardware platform
- figures 6(a) and (b) are diagrammatic representations of a display on a screen associated with the receiving device and which is controlled in accordance with the application module
- figures 7(a> and (b) are similar representations of a display on the screen and which is controlled in accordance with a mutation of the application module
- figure 8 is a diagrammatic view of relevant parts of
- a broadcasting system for broadcasting encoded services to a plurality of distributed receiving devices is generally designated by the reference numeral 10 in figurei .
- the system comprises a plurality of distributed receiving devices 1 2.1 to 12.n for encrypted broadcast services.
- Each receiving device comprises a wireless receiver connected to a suitable antenna. In the embodiment shown, the receiver is connected to a satellite dish antenna 14.1 to 14.n.
- Each receiving device 12.1 to 12.n is connected to a respective screen or monitor such as a television screen 16.1 to 16.n.
- Each receiving device comprises at least one decoder and associated smart card 17.1 to 17.n for decoding encrypted broadcast services which are broadcasted to be received by the receiving devices. Only registered receiving devices registered at an upstream database 36 are normally enabled to decrypt the encrypted services and to cause the services to be played out on the monitor.
- a return path, such as return path 19.1 may be provided from at least some of the receiving devices.
- the return path may comprise a modem (not shown) which is connectable to the head-end 30 or may at least in part comprise part of a cellular telephone infrastructure, including a cellular phone 21 .1 at the user station 23.1
- each receiving device 12.1 comprises a hardware platform 18 comprising a processor.
- the platform also comprises so-called secure silicon in that a unique ID code for chips or chip sets, forming part of the platform, is embedded in the chips or chip sets upon fabrication thereof.
- An operating system 20 runs on the platform.
- Application modules 22 are receivable by the receiving devices and are configured to execute on the hardware in conjunction with the operating system.
- Each receiving device 12.1 to 12.n is also associated with a unique electronic address which enables a selected device to be addressed individually from the broadcast head-end 30, or as part of a group of a larger population of devices 12.1 to 12.n or as part of the whole population.
- the range is hence 0.0,0.0 to 255.255.255.255.255.
- the number 0 may not be bound and may be used to blanket address all devices falling in an address range.
- the electronic addresses and aforementioned embedded hardware codes may be related.
- the electronic addresses are generated and stored in the devices at manufacturing of the devices.
- the electronic address and hardware code as well as a smart card number associated with a respective smart card may be stored in the database 36 (shown in figurei ).
- a processor on the smart card 17.1 and the processor of the device 12.1 may cooperate and on an instruction from a back-end processor and under guidance of the back-end processor, generate and store on the smart card and/or on the device a unique code or "biometric code" which is derived from data relating to the device on the one hand and data relating to the smart card on the other. Since this generation is performed under control or guidance of the back-end processor, the biometric codes for each back-end registered smart card and device combination, would be known to the back-end processor.
- the application module 22 comprises an application execution engine part 24 comprising the application code, an application data part 26 and a business rules part 28.
- the engine 24 is configured to interoperate the application data part 26.
- the business rules part 28 dictates how the application module behaves on a hosting receiving device 12.1 to 12.n.
- the module is compiled at a head-end 30 (shown in figure 1 ) utilizing a special tool 32.
- 12.1 to 12.n comprises the steps of broadcasting from the head-end 30 via a satellite communication path 34 to the distributed devices 12.1 to 12.n, the application module 22 comprising the application code part 24, the application data part 26 and the business rules part 28.
- the application 22 is sequentially mutated 22', 22", 22'"....by changing at least one of the application code part, the business rules part and the application data part.
- the application module 22 interrogates the hardware platform 18 via the operating system 20 regarding the embedded code. If the module 22 determines that the embedded code is not a code registered in the aforementioned upstream database, the business rules part causes the receiving device, as shown in figure 5(c), to operate in a predetermined manner.
- a first application module 22 is broadcast to all or a group of devices 12.1 to 1 2.n.
- the application module 22, when hosted on the devices, is configured to read the aforementioned unique code or biometric code and to compare on the device the code read and the code, which according to the back-end processor, should be the code for a particular combination of device and associated smart card. If the compared codes of a device 12.k do not match, a first version of the business rules part 28 of the application module 22 is configured to cause the device 12.k to display on the associated monitor 16.k a message, such as that shown in figure 6(b).
- the message comprises an encrypted number 60 comprising the aforementioned electronic address of the device 12.k.
- Genuine and properly registered devices such as device 12.1 connected to screen 16.1 shown in figure 6(a), continues to operate normally.
- the aforementioned displayed message requests the user to return via return path 19.k, the encrypted number 60.
- the returned number is processed at the back-end to update a list of electronic addresses associated with unregistered smart cards hosted in the database 36.
- the user may be given an opportunity, within a specified time window, to register the unregistered card. If done, the services may not be interrupted.
- the first mutation comprises the electronic address of the unregistered device 1 2.k, typically as part of the application data part 26. Therefore at least the application data part 26 of the first mutation 22' is different from the application data part of the original application module 22.
- the business rules part 28 of the first mutation 22' may also differ from the first version of the business rules part of original application module 22.
- the business rules part in the first mutation 22' may dictate that device 12.k be switched from the normal operating state as shown in figure 7(a) to a stand-by or disabled state, wherein the device 12.k is disabled from playing out the content on the screen
- the generation of mutations of the application module 22 may be triggered by a response comprising response data received from a selected device or devices, or, from users of such devices.
- at least one of the application data part 26 and the business rules part 28 is changed.
- the entire mutated module 22' may be broadcasted from the head end and in other forms, only the changed parts may be so broadcasted.
- the mutations are automatically generated intermittently, to stay ahead of hackers, imitators and copiers.
- At least one mutation application module 22' is generated and executed, but it will be appreciated that any suitable number of mutation modules 22", 22'" may sequentially be generated and executed.
- a system 100 comprising backend server 132 and a client or user devices 1 12.1 is shown in figure 8.
- a suite of software algorithms ( ⁇ 1 , ⁇ 2, ⁇ 3 and ⁇ 4) for the compression and manipulation of digital interactive information is executed by the system 100.
- the suite of software algorithms is used for the interactive synchronization and management of broadcast data for digital program content.
- the result output of the system gives a user of the device 1 12.1 a two-way interactive perception on the user play-out device 1 12.1 , although the transmission/broadcast may only one-way, from back-end 132 to device 1 12.1 .
- the backend server 132 executes several algorithms and software modules that produce compressed interactive epsilon ( ⁇ ) binary flow code that may either be broadcast directly to client devices 1 12.1 (Set Top Boxes, kiosks, mobile phones etc) or further interpreted for play- out to third party devices using specific proprietary applications.
- These modules provide several tool sets that allow the integration of interactive menus and special objects called “gadgets” for the enhanced user experience of viewing and interacting with broadcast or streamed digital content.
- the content management system comprises the following main modules Epsilon Designer, Epsilon Broadcast Automation, Epsilon
- Epsilon Designer is a Rapid Interactive TV Application Development (RAD) tool for developing application for several different output devices such as Set Top Box's (STBs) and kiosks.
- STBs Set Top Box's
- kiosks for developing application for several different output devices such as Set Top Box's (STBs) and kiosks.
- the automation engine allows system critical data flow processes for interactive applications. It enables real-time data updates to be multicast with intrinsic binary data.
- the synchronization engine allows the interactive play-out of interactive content with program and advertising information.
- Interactive application play-out allows targeted advertising for interactive view of products.
- the first algorithm ⁇ 1 interprets any vector graphic input into an efficient and compressed data block.
- the data is further processed through a special interactive engine that allows the integration of interactive objects with the vector produced data. These may include dialogue boxes, buttons, action items, triggers and events.
- the algorithm then takes this data block and using a second encoding algorithm ⁇ 3 to produce an efficient and compressed Extensible Mark-up Language (XML) file with embedded content and interactive objects, called gadgets. These objects and gadgets may be encrypted and encapsulated with a unique algorithm.
- XML Extensible Mark-up Language
- the XML file is a generic output of the first set of unique algorithms that may then be further encoded for a specific target device.
- the target device may run software (middleware).
- the resultant output of the third encoding ⁇ 3 is a binary source flow file that may be played using the Epsilon broadcast server and synchronisation engine to the target devices.
- the Epsilon client application ⁇ 4 that resides in each user device 14 is agnostic to the mechanism used to play-out the source binary file to the device.
- the source binary file may be streamed by the broadcaster or it may be streamed using any TCP/IP or broadband connectivity.
- the Epsilon client module ⁇ 4 interprets the received binary source file and places the necessary objects and gadgets on the receiving device screen.
- the algorithm used in the client module ⁇ 4 offers the intelligence required to interpret the interactive reactions of each unique user to the gadgets and objects displayed on the screen, offering a seamless interactive experience.
- the epsilon playback on the receiving device 1 12.1 may be used for several applications for interactive advertising, games, education programs and even a form of unique mutating conditional access.
- the system according to the invention may also be used selectively to disable or switch off remote devices 1 12.1 as hereinbefore described.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
A method of controlling at least one of a plurality of distributed receiving devices for encrypted broadcast services comprising the steps of broadcasting to the at least one device (12.1 to 12.n) an application module 22 comprising an application code part, a business rules part and an application data part. The module is sequentially mutated 22', 22" by changing at least one of the application code part, the business rules part and the application data part. The mutated application modules 22, 22' 22"... are sequentially executed by the device and the device is caused to operate in accordance with the mutated application modules.
Description
METHOD AND SYSTEM FOR CONTROLLING DISTRIBUTED SET TOP BOXES
INTRODUCTION AND BACKGROUND
This invention relates to a method and system for controlling a receiving device for encrypted broadcast services at a user station. More particularly, the invention relates to a method and system for controlling a set-top box connected to a television monitor at a user station.
It is well known that smart cards for set-top boxes or the like intended to be connected to television (TV) sets and to decode encrypted services broadcasted from one or more head-ends, are cloned by unauthorized parties and the cloned cards are sold to customers. These cloned smart cards may then be used with genuine boxes by pirate viewers. These viewers are then in a position to receive and view the services without paying a subscription or paying a discounted subscription to the unauthorized parties. It will be appreciated that these unauthorized parties and pirate viewers cause serious damage for, amongst others, the service broadcasters.
OBJECT OF THE INVENTION Accordingly, it is an object of the present invention to provide a method and system with which the applicant believes the aforementioned disadvantages may at least be alleviated or which may
provide a useful alternative to known methods and systems for controlling receiving devices for encrypted broadcast services.
SUMMARY OF THE INVENTION A method of controlling at (east one of a plurality of distributed receiving devices for encrypted broadcast services, the method comprising the steps of: broadcasting to the at least one device an application module comprising an application code part, a business rules part and an application data part; sequentially mutating the application module by changing at least one of the application code part, the business rules part and the application data part;
- causing the mutated application modules sequentially to be executed by the at the at least one device; and
- causing the at least one device to operate in accordance with the mutated application modules.
The receiving device may comprise a wireless receiver, which may be a satellite receiver or terrestrial receiver.
The receiving device may comprise at least one decoder and a respective key token, such as a smart card, for decoding encrypted service data broadcasted by a broadcasting head-end.
in one form of the method, the application module is broadcasted to n devices and a first mutation of the application module is executed by m devices selected from the n devices and wherein m < n.
The first mutation may be generated in response to response data received from the selected devices, or users of the selected devices.
The first mutation may comprise an application data part which is different from the application data part of the application module.
The first mutation may comprise a business rules part which is different from the business rules part of the application module.
The response data from each selected device may comprise data relating to a unique address associated with the device.
Also included within the scope of the present invention is a system for controlling at least one of a plurality of distributed receiving devices for encrypted broadcast services, the system comprising: a broadcast head-end comprising a server, a database and a transmitter; an application module mutating tool connected to the head-end, the tool being configured to generate an application module comprising an application code part, an application data part and a business rule part and the tool further being configured to mutate the application module by changing at least one of the application code part, the application data part and the business rules part; the head end being configured sequentially to broadcast the application module and at least part of the mutated application modules; and the plurality of receiving devices being configured to receive the application module and a processor of each device being configured sequentially to execute the application module and at least one mutated application module and to cause the device to operate in accordance with the application module and the at least one mutated application module.
BRIEF DESCRIPTION QF THE ACCOMPANYING DtAGRAMS
The invention will now further be described, by way of example only, with reference to the accompanying diagrams wherein: figure 1 is a diagrammatic representation of a broadcasting system comprising a plurality of distributed receiving devices for encrypted broadcast services; figure 2 is a diagrammatic representation of relevant parts of the receiving device and an application module hosted on the device; figure 3 is a diagrammatic representation of relevant parts of a mutating application which in use is intermittently mutated and broadcasted to the receiving devices; figure 4 is a similar diagram of the module in compiled form; figures 5 (a) to (c) are diagrammatic representations of the application module communicating with a hardware platform of the receiving device via an operating system running on the hardware platform; figures 6(a) and (b) are diagrammatic representations of a display on a screen associated with the receiving device and which is controlled in accordance with the application module;
figures 7(a> and (b) are similar representations of a display on the screen and which is controlled in accordance with a mutation of the application module; and figure 8 is a diagrammatic view of relevant parts of a system.
DESCRIPTION OF A PREFERRED EMBODIMENT OF THE INVENTION
A broadcasting system for broadcasting encoded services to a plurality of distributed receiving devices is generally designated by the reference numeral 10 in figurei .
The system comprises a plurality of distributed receiving devices 1 2.1 to 12.n for encrypted broadcast services. Each receiving device comprises a wireless receiver connected to a suitable antenna. In the embodiment shown, the receiver is connected to a satellite dish antenna 14.1 to 14.n. Each receiving device 12.1 to 12.n is connected to a respective screen or monitor such as a television screen 16.1 to 16.n. Each receiving device comprises at least one decoder and associated smart card 17.1 to 17.n for decoding encrypted broadcast services which are broadcasted to be received by the receiving devices. Only registered receiving devices registered at an upstream database 36 are normally enabled to decrypt the encrypted services and to cause the services to be played out on the
monitor. A return path, such as return path 19.1 , may be provided from at least some of the receiving devices. The return path may comprise a modem (not shown) which is connectable to the head-end 30 or may at least in part comprise part of a cellular telephone infrastructure, including a cellular phone 21 .1 at the user station 23.1
Further, and as shown in figure 2, each receiving device 12.1 comprises a hardware platform 18 comprising a processor. The platform also comprises so-called secure silicon in that a unique ID code for chips or chip sets, forming part of the platform, is embedded in the chips or chip sets upon fabrication thereof. An operating system 20 runs on the platform. Application modules 22 are receivable by the receiving devices and are configured to execute on the hardware in conjunction with the operating system.
Each receiving device 12.1 to 12.n is also associated with a unique electronic address which enables a selected device to be addressed individually from the broadcast head-end 30, or as part of a group of a larger population of devices 12.1 to 12.n or as part of the whole population. The addresses may fall in a range comprising m, typically four, bytes each capable of holding 256 numbers (ranging from 0 to 255). If zero is ignored for the purpose hereinafter described, the
remaining 255 numbers allow (255)4 = 4,228,250,625 devices to be addressed either separately or in groups. The range is hence 0.0,0.0 to 255.255.255.255. The number 0 may not be bound and may be used to blanket address all devices falling in an address range. For example, if the address 255.255.0.0 is used, all devices with addresses in the range 255.255.1 .1 to 255.255.255.255 (that is 64516 devices) would be addressed. On the other hand electronic address 192.168.10.100 would address a single device in the population 12.1 to 12.n
The electronic addresses and aforementioned embedded hardware codes may be related. The electronic addresses are generated and stored in the devices at manufacturing of the devices. The electronic address and hardware code as well as a smart card number associated with a respective smart card may be stored in the database 36 (shown in figurei ).
For each device 12.1 to 12.n a processor on the smart card 17.1 and the processor of the device 12.1 may cooperate and on an instruction from a back-end processor and under guidance of the back-end processor, generate and store on the smart card and/or on the device a unique code or "biometric code" which is derived from data relating
to the device on the one hand and data relating to the smart card on the other. Since this generation is performed under control or guidance of the back-end processor, the biometric codes for each back-end registered smart card and device combination, would be known to the back-end processor.
Referring to figures 3 and 4, the application module 22 comprises an application execution engine part 24 comprising the application code, an application data part 26 and a business rules part 28. The engine 24 is configured to interoperate the application data part 26. The business rules part 28 dictates how the application module behaves on a hosting receiving device 12.1 to 12.n. The module is compiled at a head-end 30 (shown in figure 1 ) utilizing a special tool 32.
Referring to figure 1 , a method of controlling the receiving devices
12.1 to 12.n comprises the steps of broadcasting from the head-end 30 via a satellite communication path 34 to the distributed devices 12.1 to 12.n, the application module 22 comprising the application code part 24, the application data part 26 and the business rules part 28. The application 22 is sequentially mutated 22', 22", 22'"....by changing at least one of the application code part, the business rules part and the application data part. The application module 22 and
mutated application modules 22', 22", 22'"....are sequentially executed by the at least one device and the at least one device is caused to operate in accordance with the application module 22 and mutated application modules 22', 22" More particularly, the application module 22 and the mutated application modules 22', 22",
22"'...., in conjunction with the operating system 20 and the hardware platform 18, cause the receiving devices 12.1 to 12.n to operate in a predetermined manner.
For example and referring to figures 5(a) to 5(b), the application module 22 interrogates the hardware platform 18 via the operating system 20 regarding the embedded code. If the module 22 determines that the embedded code is not a code registered in the aforementioned upstream database, the business rules part causes the receiving device, as shown in figure 5(c), to operate in a predetermined manner.
In one form of the method and in order to determine whether unregistered smart cards or cloned smart cards 17.k are used to decode broadcast services, a first application module 22 is broadcast to all or a group of devices 12.1 to 1 2.n. The application module 22, when hosted on the devices, is configured to read the aforementioned unique code or biometric code and to compare on the device the code
read and the code, which according to the back-end processor, should be the code for a particular combination of device and associated smart card. If the compared codes of a device 12.k do not match, a first version of the business rules part 28 of the application module 22 is configured to cause the device 12.k to display on the associated monitor 16.k a message, such as that shown in figure 6(b). The message comprises an encrypted number 60 comprising the aforementioned electronic address of the device 12.k. Genuine and properly registered devices, such as device 12.1 connected to screen 16.1 shown in figure 6(a), continues to operate normally.
The aforementioned displayed message requests the user to return via return path 19.k, the encrypted number 60. The returned number is processed at the back-end to update a list of electronic addresses associated with unregistered smart cards hosted in the database 36.
The user may be given an opportunity, within a specified time window, to register the unregistered card. If done, the services may not be interrupted.
However, if the device or smart card is not registered within the time window, data relating to a first mutation 22' of the application module may be broadcasted from the head-end 30. The first mutation
comprises the electronic address of the unregistered device 1 2.k, typically as part of the application data part 26. Therefore at least the application data part 26 of the first mutation 22' is different from the application data part of the original application module 22. The business rules part 28 of the first mutation 22' may also differ from the first version of the business rules part of original application module 22. The business rules part in the first mutation 22' may dictate that device 12.k be switched from the normal operating state as shown in figure 7(a) to a stand-by or disabled state, wherein the device 12.k is disabled from playing out the content on the screen
16.k.
As in the case of the example hereabove, the generation of mutations of the application module 22 may be triggered by a response comprising response data received from a selected device or devices, or, from users of such devices. In a preferred form of the invention, at least one of the application data part 26 and the business rules part 28 is changed. The entire mutated module 22' may be broadcasted from the head end and in other forms, only the changed parts may be so broadcasted.
In still other forms of the method, the mutations are automatically generated intermittently, to stay ahead of hackers, imitators and copiers. At least one mutation application module 22' is generated and executed, but it will be appreciated that any suitable number of mutation modules 22", 22'" may sequentially be generated and executed.
A system 100 comprising backend server 132 and a client or user devices 1 12.1 is shown in figure 8.
A suite of software algorithms ( ε 1 , ε2, ε3 and ε4) for the compression and manipulation of digital interactive information is executed by the system 100. The suite of software algorithms is used for the interactive synchronization and management of broadcast data for digital program content. The result output of the system gives a user of the device 1 12.1 a two-way interactive perception on the user play-out device 1 12.1 , although the transmission/broadcast may only one-way, from back-end 132 to device 1 12.1 .
The backend server 132 executes several algorithms and software modules that produce compressed interactive epsilon ( ε ) binary flow code that may either be broadcast directly to client devices 1 12.1 (Set
Top Boxes, kiosks, mobile phones etc) or further interpreted for play- out to third party devices using specific proprietary applications.
These modules provide several tool sets that allow the integration of interactive menus and special objects called "gadgets" for the enhanced user experience of viewing and interacting with broadcast or streamed digital content.
The content management system comprises the following main modules Epsilon Designer, Epsilon Broadcast Automation, Epsilon
Synchronisation and Epsilon Debug.
Epsilon Designer is a Rapid Interactive TV Application Development (RAD) tool for developing application for several different output devices such as Set Top Box's (STBs) and kiosks.
The automation engine allows system critical data flow processes for interactive applications. It enables real-time data updates to be multicast with intrinsic binary data.
The synchronization engine allows the interactive play-out of interactive content with program and advertising information.
Interactive application play-out allows targeted advertising for interactive view of products.
Referring again to the diagram, the first algorithm ε 1 interprets any vector graphic input into an efficient and compressed data block.
The data is further processed through a special interactive engine that allows the integration of interactive objects with the vector produced data. These may include dialogue boxes, buttons, action items, triggers and events. The algorithm then takes this data block and using a second encoding algorithm ε3 to produce an efficient and compressed Extensible Mark-up Language (XML) file with embedded content and interactive objects, called gadgets. These objects and gadgets may be encrypted and encapsulated with a unique algorithm.
The XML file is a generic output of the first set of unique algorithms that may then be further encoded for a specific target device. The target device may run software (middleware).
The resultant output of the third encoding ε3 is a binary source flow file that may be played using the Epsilon broadcast server and synchronisation engine to the target devices.
The Epsilon client application ε4 that resides in each user device 14 is agnostic to the mechanism used to play-out the source binary file to the device. For example, the source binary file may be streamed by the broadcaster or it may be streamed using any TCP/IP or broadband connectivity.
On reception of the source binary file, the Epsilon client module ε4 interprets the received binary source file and places the necessary objects and gadgets on the receiving device screen. The algorithm used in the client module ε4 offers the intelligence required to interpret the interactive reactions of each unique user to the gadgets and objects displayed on the screen, offering a seamless interactive experience.
The epsilon playback on the receiving device 1 12.1 may be used for several applications for interactive advertising, games, education programs and even a form of unique mutating conditional access.
The system according to the invention may also be used selectively to disable or switch off remote devices 1 12.1 as hereinbefore described.
Claims
1 . A method of controlling at least one of a plurality of distributed receiving devices for encrypted broadcast services, the method comprising the steps of: - broadcasting to the at least one device an application module comprising an application code part, a business rules part and an application data part; mutating the application module at least once by changing at least one of the application code part, the business rules part and the application data part;
- causing the application module and the mutated application module sequentially to be executed by the at the at least one device; and causing the at least one device to operate in accordance with the application module and the mutated application module.
2. A method as claimed in claim 1 wherein the application module is broadcasted to n devices and wherein a first mutation of the application module is executed by m devices selected from the n devices and wherein m < n.
3. A method as claimed in claim 2 wherein the first mutation is generated in response to response data received from the selected devices, or users of the selected devices.
4. A method as claimed in any one of claims 2 and 3 wherein the first mutation comprises an application data part which is different from the application data part of the application module.
5. A method as claimed in any one of claims 2 to 4 wherein the first mutation comprises a business rules part which is different from the business rules part of the application module.
6. A method as claimed in any one of claims 3 to 5 wherein the response data from each selected device comprises data relating to a unique address associated with the device,
7. A system for controlling at least one of a plurality of distributed receiving devices for encrypted broadcast services, the system comprising: a broadcast head-end comprising a server, a database and a transmitter; an application module mutating tool connected to the head-end, the tool being configured to generate an application module comprising an application code part, an application data part and a business rule part and the tool further being configured to mutate the application module by changing at least one of the application code part, the application data part and the business rules part; the head end being configured sequentially to broadcast the application module and at least part of the mutated application modules; and the plurality of receiving devices being configured to receive the application module and a processor of each device being configured sequentially to execute the application module and at least one mutated application module and to cause the device to operate in accordance with the application module and the at least one mutated application module.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ZA200901905 | 2009-03-18 | ||
ZA2009/01905 | 2009-03-18 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010106518A1 true WO2010106518A1 (en) | 2010-09-23 |
Family
ID=42229291
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2010/051185 WO2010106518A1 (en) | 2009-03-18 | 2010-03-18 | Method and system for controlling distributed set top boxes |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2010106518A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013056622A1 (en) * | 2011-10-18 | 2013-04-25 | 华为终端有限公司 | Method for verifying access identity of set top box and authentication server |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020031224A1 (en) * | 1998-09-08 | 2002-03-14 | On Command Corporation | Secure multimedia communications system |
US6550008B1 (en) * | 1999-02-26 | 2003-04-15 | Intel Corporation | Protection of information transmitted over communications channels |
FR2865592A1 (en) * | 2004-01-28 | 2005-07-29 | Noel Vogt | Encrypted television signals broadcasting method, involves executing validity checks of decoders and remote control center, where center transmits authorization data for decrypting encrypted signal when validity checks are positive |
US20080008321A1 (en) * | 2006-07-10 | 2008-01-10 | Syphermedia International, Inc. | Conditional access enhancements using an always-on satellite backchannel link |
-
2010
- 2010-03-18 WO PCT/IB2010/051185 patent/WO2010106518A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020031224A1 (en) * | 1998-09-08 | 2002-03-14 | On Command Corporation | Secure multimedia communications system |
US6550008B1 (en) * | 1999-02-26 | 2003-04-15 | Intel Corporation | Protection of information transmitted over communications channels |
FR2865592A1 (en) * | 2004-01-28 | 2005-07-29 | Noel Vogt | Encrypted television signals broadcasting method, involves executing validity checks of decoders and remote control center, where center transmits authorization data for decrypting encrypted signal when validity checks are positive |
US20080008321A1 (en) * | 2006-07-10 | 2008-01-10 | Syphermedia International, Inc. | Conditional access enhancements using an always-on satellite backchannel link |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013056622A1 (en) * | 2011-10-18 | 2013-04-25 | 华为终端有限公司 | Method for verifying access identity of set top box and authentication server |
US8832727B2 (en) | 2011-10-18 | 2014-09-09 | Huawei Device Co., Ltd. | Method and authentication server for verifying access identity of set-top box |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7716662B2 (en) | System and method for generating a set top box code download step sequence | |
US8817095B2 (en) | Locally originated IPTV programming | |
KR101995425B1 (en) | Video display device, terminal device and operating method thereof | |
US20040163134A1 (en) | Digital television set with gaming system emulating a set top box | |
JP2006005897A (en) | Terminal device, content distribution system, information output method, information output program | |
WO2006129404A1 (en) | Contents reproduction device, method for providing service-related information, service-related information providing device, and service providing system | |
US8850590B2 (en) | Systems and methods for using transport stream splicing for programming information security | |
US20150311992A1 (en) | System and method for real-time viewer feedback to broadcast media | |
WO2010106518A1 (en) | Method and system for controlling distributed set top boxes | |
US9674306B2 (en) | Method and system for communicating from a client device to a server device in a centralized content distribution system | |
JP7381690B2 (en) | video display system | |
US20090193450A1 (en) | Signal receiver security apparatus and methods | |
JP6855193B2 (en) | Broadcast reception system | |
JP6920569B2 (en) | Broadcast receiver and content protection processing method | |
KR100611370B1 (en) | Participation in broadcast program by avatar and system which supports the participation | |
CN113891162A (en) | Live broadcast room loading method and device and computer equipment | |
US10390100B2 (en) | Method and system for controlling a centralized content distribution system with a remote control | |
JP6855196B2 (en) | Broadcast reception system | |
JP6855195B2 (en) | Broadcast reception system | |
JP7062114B2 (en) | Broadcast reception system | |
JP7418647B1 (en) | Broadcast receiving device and content protection processing method | |
JP6923727B2 (en) | Copy control method for broadcast program content | |
JP6928130B2 (en) | Broadcast program output method | |
JP2022097529A (en) | Broadcast receiving system | |
CN115022724A (en) | Live broadcast room cover display method and system based on battle playing method and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10713518 Country of ref document: EP Kind code of ref document: A1 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10713518 Country of ref document: EP Kind code of ref document: A1 |