专利摘要:
This method of providing protected multimedia content in which a terminal: a) acquires (1408) a date of service from a date server, b) evaluates (1414) a time criterion of a license with respect to the last date of service acquired, then, if the result of the evaluation is positive, extracts (1416, 1418) a license access right thus allowing access to the segments and, otherwise, inhibits (1414) the extraction of the license access right, and wherein: - a headend associates (1202) each segment its transmission date, and transmits (1206) in a flow jointly to the segment, then, - the terminal extracted (1400 , 1402) of the flow the transmission date of the segment, acquires it (1406) as a service date, and uses it (1414) as the last service date acquired during an execution of step b) between two executions successive stages of step a).
公开号:FR3018125A1
申请号:FR1451666
申请日:2014-03-02
公开日:2015-09-04
发明作者:Mathieu Phirmis;Mathieu Boivin;Quentin Chieze;Nicolas Pochon
申请人:Viaccess SAS;
IPC主号:
专利说明:

[0001] BACKGROUND OF THE INVENTION The invention relates to a method of providing, to a terminal, multimedia contents protected by a system for protecting multimedia contents.  The invention also relates to a method for obtaining, by a terminal, protected multimedia contents for the implementation of this method of providing multimedia content.  The invention finally relates to a terminal and an information recording medium for implementing this method of obtaining multimedia contents.  [2] The methods considered may be implemented for any service providing protected multimedia contents, in any system for the on-line supply of protected multimedia content, in which a head-end provides for the protection of the contents and their transmission. to a plurality of terminals.  [003] A terminal is used by a customer of the service to access content for the purpose of playing it.  Accessing multimedia content here means loading it into memory and lifting the protection, on the fly when it is received, or on a recording medium on which it has been previously recorded, record it, or make it any other use offered by the protected multimedia content service.  [004] The content provided is: - audiovisual content, for example television programs, - audio content only, for example a radio program, or - more generally, any digital content containing video and / or video audio 25 such as a computer application, a game, a slide show, an image or any data set.  Among these contents, it will be considered more particularly in the following so-called temporal content.  Time-based multimedia content is multimedia content whose play is a succession in time of sounds, in the case of audio temporal content, or of images, in the case of a video temporal content, or of sounds and temporally synchronized images between them in the case of an audiovisual temporal multimedia content.  Time-based multimedia content may also include interactive temporal components temporally synchronized with the sounds or images.  [006] To be provided, such content is first encoded, i.e., compressed, so that its transmission requires less bandwidth.  [007] For this purpose, the video component of the content is coded in a video format, such as for example MPEG-2.  The interested reader can find a complete presentation of this format in the document published by the International Organization for Standardization under the reference ISO / IEC 13818-2: 2013 and the title "Information technology - Generic coding of moving images and his partner - Part 2: Video data ".  Many other formats, such as MPEG-4 ASP, MPEG-4 Part 2, MPEG-4 AVC (or Part 10), HEVC (High Efficiency Video Coding), or WMV (Windows Media Video) can alternatively be used, and rest on the same principles.  Thus, all that follows also applies to these other video formats that are based on the same principle as MPEG-2 encoding.  [008] MPEG-2 coding uses general methods of data compression.  For the still images, it exploits in particular the spatial redundancy internal to an image, the correlation between the neighboring points and the less sensitivity of the eye to the details.  For animated images, it exploits the strong temporal redundancy between successive images.  The exploitation of the latter makes it possible to code certain images of the content, here said deduced, with reference to others, here referred to as sources, for example by prediction or interpolation, so that their decoding is possible only after that of said source images.  Other images, here called initial, are encoded without reference to such source images, that is to say that they each contain, when they are encoded, all the information necessary for their decoding and therefore that they can be completely decoded independently of other images.  The initial images are thus the entry point required when accessing the content.  The resulting encoded content therefore does not include the data needed to decode each of the images independently of the others, but consists of "sequences" according to the MPEG-2 terminology.  A sequence performs the compression of at least one "group of images" (or GOP, for Group Of Pictures, in MPEG-2).  A group of images is a series of consecutive images in which each image is: - either initial and source for at least one derived image contained in the same sequence of consecutive images, - is deduced and such that each of the necessary source images at its decoding 30 belongs to the same sequence of consecutive images.  A group of images does not contain a sequence of consecutive images smaller and having the same properties as above.  The group of images is thus the smallest part of content that can be accessed without having to decode beforehand another part of this content.  [009] A sequence is delimited by a "header" and an "end", each identified by a first specific code.  The header has parameters that characterize expected properties of decoded images, such as horizontal and vertical sizes, ratio, frequency.  The standard recommends that the header be repeated between groups of frames in the sequence, so that its successive occurrences are spaced about a few seconds apart in the encoded content.  For example, a group of images most commonly includes more than 5 to 10 images and, generally, less than 12 or 20 or 50 images.  For example, in a system 25 frames per second, a group of images typically represents a game time greater than 0.1 or 0.4 seconds and generally less than 0.5 or 1 or 10 seconds.  Time-based multimedia content may comprise several video components.  In this case, each of these components is coded as described above.  The audio component of the content is also encoded in an audio format such as MPEG-2 Audio.  The interested reader will be able to find a complete presentation of this format in the document published by the International Organization for Standardization under the reference ISO / IEC 13818-3: 1998 and the title "Information technology - Generic coding of moving pictures and images". associated sound information - Part 3: Sound.  Many other formats, such as MPEG-1 Layer III, better known as MP3, AAC (Advanced Audio Coding), Vorbis or WMA (Windows Media Audio), can alternatively be used, and are based on the same principles.  Thus, all that follows also applies to these other audio formats that are based on the same principles as MPEG-2 Audio encoding.  The MPEG-2 Audio coding obeys the same principles described above for that of a video temporal content.  The resulting coded content is thus, analogously, constituted by "frames".  A frame is the analogue, in audio, of a group of images in video.  The frame is therefore the smallest part of audio content that can be accessed without having to decode another part of this audio content.  The frame also contains all the information useful for its decoding.  A frame typically has more than 100 or 200 samples each encoding a sound and, generally, less than 2000 or 5000 samples.  Typically, when played by a multimedia device, a frame lasts more than 10 ms or 20 ms and, generally, less than 80 ms or 100 ms.  For example, a frame has 384 or 1152 samples each encoding a sound.  Depending on the signal sampling frequency, this frame represents a play time of 8 to 12, or 24 to 36 milliseconds.  Time-based multimedia content may comprise several audio components.  In this case, each of these components is coded as described above.  The coded components of the content, also referred to as elementary data streams, are then multiplexed, that is to say, in particular, synchronized temporally, and then combined into a single stream, or stream, of data.  Such content, especially when it is the subject of rights such as copyright or neighboring rights, is provided protected by a multimedia content protection system.  This system makes it possible to ensure the respect of conditions of access to the content which result from these rights.  It is then typically provided encrypted under its protection by a digital rights management system, or DRM for Digital Rights Management, in English.  This encryption is generally achieved by means of an encryption key, by a symmetric algorithm.  It applies to the flow resulting from the multiplexing or, before multiplexing, to the components of the encoded content.  A DRM system is indeed a system for protecting multimedia contents.  The terminology of the domain of digital rights management systems is thus used in the remainder of this document.  The interested reader can for example find a more complete presentation in the following documents: - Concerning the general architecture of a DRM system: DRM Architecture, Draft version 2. 0, OMA-DRM-ARCH-V2_0-20040518-D, Open Mobile Alliance, May 18, 2004, - Concerning more specifically the licenses: DRM Specification, Draft version 2. 1, OMA-TS-DRM-DRM-V2 1-20060523-D, Open Mobile Alliance, May 23, 2006.  In such a digital rights management system, obtaining a license allows a terminal to access the protected multimedia content.  Well known structure such a license includes at least a right of access necessary for this terminal to access the content, and typically a time criterion of validity.  The access right typically comprises a key, called a content key, which is necessary for the decryption of the multimedia content protected by a symmetric decryption algorithm.  The temporal validity criterion characterizes the period of time over which the license can be exploited.  It typically consists of one or more time intervals.  Outside these time slots, the license does not allow access to the content.  The content key is generally inserted in the license in the form of a cryptogram obtained by encryption of the content key with an encryption key, called "terminal", specific to the terminal.  To access the content, the terminal extracts the license key content by decrypting its cryptogram by means of its terminal key.  The terminal then descrambles the content by means of the content key and extracted from the license, thereby lifting the protection.  Then, the terminal decodes the descrambled content.  The terminal thus generates a clear multimedia stream comprising at least one temporal sequence of video sequences or groups of images, or audio frames.  This multimedia stream is able to be played by a multimedia device connected to this terminal.  Here, by "in clear", it is meant that the multimedia stream no longer needs to be descrambled to be played by a multimedia device in a manner directly perceptible and intelligible by a human being.  By "multimedia device" means any device capable of playing the multimedia stream in the clear, such as for example a TV or a media player.  In order to improve the protection, the content is provided by the system for providing protected multimedia content, divided into several successive segments of content individually protected by the digital rights management system. These segments are thus ordered temporally with respect to each other.  More specifically, a segment is a restricted part of the multimedia stream in clear whose game has a duration less than that of the game of the entire multimedia stream.  A segment therefore comprises a restricted portion of each video and audio component of the multimedia stream in clear, whose game has the same duration less than that of the game of the entire multimedia stream.  These restricted parts of components are synchronized in the stream to be played simultaneously.  A segment therefore comprises the restricted part of the temporal sequence of video sequences or groups of images, or audio frames coding this restricted part of the multimedia stream in the clear.  This restricted part consists of a plurality of video sequences or groups of images, or successive audio frames.  Successive is understood here as following immediately, that is to say without being separated, in the temporal course of the content, by other video sequences or groups of images, or audio frames belonging to another segment.  Typically, a segment comprises more than ten, one hundred, one thousand or ten thousand groups of successive video images of the same coded video component of the stream, or more than ten to one hundred times more successive audio frames of the same audio component. encoded stream.  Each segment is encrypted by the symmetric algorithm, for its protection by the digital rights management system, by means of a specific content key.  This content key is called "specific" because it is only used to encrypt this segment among all the segments of the multimedia content.  Obtaining a specific license, including the specific content key needed to decrypt the protected segment, allows a terminal to access this segment.  A segment is not characterized by its structure, but by the specific content key used to encrypt it.  A segment is the plurality of video sequences and immediately successive audio frames encrypted with the same specific content key.  To further improve the protection of the content, an intermediate level of encryption of the content keys is introduced.  It makes it possible to change, during the temporal course of the content, the encryption keys used to calculate the cryptograms of the specific content keys transported in the specific licenses.  For this purpose, the segment segments are grouped together.  Each block contains only a small portion of the segments of the content.  Typically, each block contains at least one segment and, generally, several successive segments.  Successive is understood here as following immediately, that is to say without being separated, in the temporal course of the content, by segments not belonging to the block considered.  Each of these blocks is associated with a content key encryption key, called an intermediate key.  The content key needed to decrypt a segment is encrypted with the intermediate key associated with the block to which this segment belongs.  The resulting cryptogram is then inserted in a license, called intermediate license, transmitted jointly to the segment.  The intermediate license also includes an identifier of a license, called "terminal".  The terminal license includes a cryptogram of the intermediate key obtained by encryption of this intermediate key with the terminal key.  A block of segments is not characterized by its structure, but by the intermediate key used to encrypt the specific content key of any segment belonging to it.  A segment block therefore corresponds to segments each associated with an intermediate license in which the specific content key is encrypted with the same intermediate key.  In such a system, a terminal therefore receives, in conjunction with an encrypted segment, an intermediate license including the cryptogram of the specific content key necessary for the decryption of the segment.  This cryptogram was obtained by encrypting this specific content key with an intermediate key.  In order to access the segment, the terminal must first obtain the terminal license which includes the cryptogram of this intermediate key obtained by encrypting this key with its terminal key.  The terminal obtains this terminal license by means of the identifier contained in the intermediate license.  To use this terminal license, the terminal must then first evaluate its time criterion against a date of service, controlled by the service operator as a time reference of the service.  This evaluation consists of determining whether the service date, typically expressed in seconds, is or is not included in the period of validity of the terminal license.  The terminal must know or acquire the date of service.  If the result of the evaluation of the temporal criterion of the terminal license is positive, the terminal continues to operate the terminal license, including by decrypting the cryptogram of the intermediate key that it comprises, by means of his terminal key.  If the result of this evaluation is negative, the terminal inhibits the use of the terminal license, and in particular decrypts the cryptogram of the intermediate key that it contains.  This prohibits the exploitation of the intermediate license, and access to the protected segment through the content key which it includes the cryptogram.  The date of service acquired by the terminal, thus conditions its access to the block of segments 5 to which belongs the received segment, and therefore the respect of the rights of which this block is the object.  It is understood that it is important that the date of service can not be easily modified by a user of the terminal.  Indeed, it could then settle it to a date included in the period of validity of the terminal license, thus avoiding the date of service controlled by the operator, as well as the respect of rights whose corresponding segment is the object.  To overcome this drawback, it has already been proposed to equip the terminals with secure local clocks, that is to say, clocks that can not be adjusted by the user of the terminal.  Such solutions are for example disclosed in US20090006854, US20060248596 and US2010024000A1.  Many terminals do not yet have a secure clock, that is to say internal mechanism capable of locally providing a date with a warranty deemed sufficient that it is close enough to the date of service.  Most do not have a local clock, and the others have one unsecured, that is to say, unprotected and thus remaining editable by the user.  To remedy this last difficulty, it has been proposed to integrate a date server to the DRM system.  A local clock, internal to the terminal but unprotected, is then synchronized regularly with this date server, for example according to the network time protocol, said NTP, for "Network Time Protocol", 25 in English.  If the terminal does not include a local clock or if it does not wish to use this local clock, then the date of service is acquired from the date server, systematically whenever the temporal criterion of validity of a license must be evaluated.  This last embodiment is advantageous because, since the use of the date server is systematic, it dispenses with the use of a local clock and imposes the use of a service date controlled by the operator.  However, this usually results in a significant load, and therefore a computational load, on the date server, which requires a lot of servers to hold the load.  Indeed, when many terminals require, in a short period of time, access to content offered by the service for providing protected multimedia content, it is therefore necessary to evaluate the temporal criterion of validity of the corresponding licenses for each of the terminals. used.  This results in a large computational load for the date server.  This also results in significant network traffic to the date servers.  However, these computation loads and important network traffic are likely to affect the quality of the service rendered.  It is therefore particularly advantageous to reduce this load and this network traffic, while ensuring a high level of security of the system vis-à-vis the 5 attempts to manipulate the date of service.  The invention aims to achieve this goal.  The invention thus relates to a method of providing, to a terminal, multimedia contents protected by a multimedia content protection system, in which process: - during a transmission phase, a head of network: a) associates, with a block of segments of multimedia content, a necessary access right to the terminal to access any segment of this block in order to play it, and a license including the right of access and a temporal criterion of validity, each of these segments comprising at least one sequence of groups of video images or 15 audio frames, this block comprising one or more segments, b) transmits to the terminal the license and a stream comprising each segment, - when a reception phase, the terminal: c) receives the stream of segments of multimedia content, d) receives the license, 20 - during a segment play phase, the terminal: e) authenticates a date server and, only if the date server is authenticated with s uccès, acquire a date of service from this date server, f) evaluate the time criterion of the license against the last date of service acquired, then, if the result of the evaluation is positive, extract the right to access of the license thus allowing access to the segments and, otherwise, inhibits the extraction of the access right of the license thus prohibiting access to the segments, in which: - in step b), the head network associates with each of the segments its date of transmission, and transmits it into the stream together with the segment, then, during the gaming phase, during a step g), the terminal extracts the stream, together with a segment, the transmission date of the segment, acquires it as a service date, and uses it as the last date of service acquired during an execution of step f) between two successive executions of step e).  In such a method, the association, in step a), with each of the segments, with its date of transmission, and the transmission in the stream, in step b), of this date together with segment, allow the terminal to receive, in step c), this date together with the segment, and therefore to dispose of it, during the game phase.  The terminal is thus provided with a new date source, an alternative to the date server, but controlled by the operator of the service for providing protected multimedia content.  It therefore provides dates probably closer to the date of service, and more difficult to change than that of a local clock.  These dates are thus safer.  In such a method, the extraction of the stream, in step g), in conjunction with a segment, the date of transmission of the segment, allows the terminal to use as date of service this date controlled by the service operator, during an execution of step f), so without resorting to the date server.  The date server's load, as well as the associated network traffic, is reduced without compromising the security level of the system.  Finally, the transmission in the stream of the transmission date generates less network traffic than the connection to a date server.  Indeed, for each date transmitted in the stream it is not necessary to establish and then to terminate a connection with a server.  Here a connection already established between the terminal and a headend is used.  The subject of the invention is also a method for obtaining, by a terminal, for the implementation of the above method, protected multimedia contents, in which the terminal: during the reception phase: step c), receives a stream comprising each segment of the block of multimedia content segments, - in step d), receives a license with a necessary access right to the terminal to access any segment of the block in order to play it, and a time criterion of validity, during the segment play phase: in step e), authenticates a date server and, only if the date server is successfully authenticated, acquires a date of service to this date server, 30 - in step f), evaluates the temporal validity criterion of the license against the last date of acquired service, then, if the result of the evaluation is positive, extracts the access right to the license allowing access to the segments and, otherwise, inhibits the extraction of the access right of the license thus prohibiting access to the segments, in which: - during the game phase, in step g), the terminal extracts the stream, jointly to a segment, the transmission date of this segment, acquires it as a date of service, and uses it as the last date of service acquired during an execution of step f) between two successive executions of step e ).  Embodiments of this process for obtaining protected multimedia contents may include the following features: the terminal, in step g), compares the extracted transmission date with the last acquired service date, and, only if the extracted transmission date is later than the latter date of service, acquires it as a service date, and uses it as the last date of service acquired at the next execution of step f); the terminal, in step g), compares the extracted transmission date to the last acquired service date, and, only if the retrieved transmission date is earlier than this last service date of not more than a first predetermined duration then the last acquired service date is kept unchanged and the step f) is executed using this last acquired service date kept unchanged; the terminal, in step g), compares the extracted transmission date with the date of service acquired during the last execution of step e), and triggers a new execution of step e) if the difference between the extracted transmission date and this service date is greater than a second predetermined duration and, otherwise, does not trigger this new execution of step e) in response to this comparison; in step e), if the connection to the date server can not be established, in response, the terminal inhibits the extraction of the access right of the license thus prohibiting access to the segments; the terminal counts the number of consecutive times when the connection to the date server can not be established, and in response to the crossing by this number of a predetermined threshold, inhibits the extraction of the access right of the license thus prohibiting the access to the segments and, if not, authorizes the extraction of the access right of the license thus allowing access to the segments; between two consecutive executions of step f), the terminal extracts one or more transmission dates of segments received and, at each extraction of a transmission date subsequent to the last acquired service date, the terminal acquires it as date of service, to be used as the last date of service acquired at the next execution of step f).  These embodiments of this method of obtaining protected multimedia contents 35 also have the following advantages: the comparison, in step g), of the transmission date retrieved on the last date of acquired service, allows to constrain this service date to increase and therefore to restrict as much as possible the range of possible service dates between two requests to the date server; the unchanged maintenance, in step g), of the last acquired service date if the retrieved transmission date is before this service date of not more than a first predetermined duration, makes it possible to authorize a deferred play of content being received; the comparison, in step g), of the date of transmission retrieved on the date of service acquired during the last execution of step e) makes it possible to force the terminal to acquire the date of service from the server of dates, when it has not done so since at least the second predetermined duration; the inhibition, in step e), if the connection to the date server can not be established, makes it possible to reinforce the constraint of acquiring the date of service with the date server - counting the number of consecutive times where the connection to the date server 15 can not be established, protects the quality of the service rendered the influence of momentary difficulties of connection to the date server, allowing the further processing of multimedia content even in the absence of connection to the date server; the acquisition as a service date, of any transmission date retrieved after the last date of acquired service, makes it possible to force the last date of acquired service to be increased at the rate of those of the segments received.  The invention also relates to an information recording medium comprising instructions for implementing the above method of obtaining multimedia contents, when these instructions are executed by an electronic computer.  The invention finally relates to a terminal for the implementation of the method above, this terminal being suitable: during a reception phase: c) to receive a stream comprising each segment of a block of multimedia content segments, each of these segments comprising at least one sequence of groups of video images or audio frames, d) to receive a license with a necessary access right to the terminal to access any segment of the block in view to play it, and a temporal criterion of validity, during a phase of game segments: e) to authenticate a date server and, only if the date server is successfully authenticated, to acquire a date of service from date server, f) to evaluate the temporal validity criterion of the license against the last date of acquired service, and, if the result of the evaluation is positive, to extract the right of access from the license thus allowing access to segments and, s inon, to inhibit the extraction of the access right of the license thus prohibiting access to the segments, wherein the terminal includes an electronic calculator programmed for, during the game phase, implement a step g) when which it extracts from the stream, together with a segment, the transmission date of this segment, acquires it as a date of service, and uses it as the last date of service acquired during an execution of step f) between two successive executions of step e).  The invention will be better understood on reading the following description, given solely by way of nonlimiting example, and with reference to the drawings 10 in which: - Figure 1 is a schematic representation of the architecture of a system for providing protected multimedia contents, - figure 2 is a schematic representation of an intermediate license, - figure 3 is a schematic representation of a terminal license, - figure 4 is a schematic representation. of a stream transmitted by a headend to a terminal in the system of FIG. 1, - FIG. 5 is a schematic representation of a method of providing multimedia contents protected using the system of FIG.  In these figures, the same references are given to designate the same elements.  In the remainder of this description, the features well known to those skilled in the art are not described in detail.  FIG. 1 represents a system for providing protected multimedia contents.  This system comprises a plurality, typically thousands, of terminals 25 connected via a network 3, on the one hand to a network head 1, and on the other hand to a date server 2.  Here, we assume that all these terminals are identical.  Thus, to simplify the illustration, only a terminal 4 is shown in FIG.  The terminal 4 is able to access a content in order to play it.  For this purpose, the terminal 4 comprises a programmable electronic calculator 44 and a memory 46.  The computer 44 is able to execute instructions stored in the memory 46.  The memory 46 includes the instructions necessary for carrying out the method of FIG. 5.  The memory 46 also includes a last acquired service date TE and a service date TTs acquired during the last connection to the server 2.  The network 3 is a long distance information distribution network making it possible to establish bidirectional communication between the terminal 4 and the network head 1 and the server 2.  For example, the network 3 is the global spider web, better known as the "Internet network".  The head 1 of the network is able to protect a content, and to transmit it to the terminal 4.  For this purpose, the head 1 comprises a clock 12.  This clock 12 provides the head 1 the date of transmission of a content segment.  This clock 12 is here synchronized, according to the network time protocol NTP (Network Time Protocol), with a first reference clock external to the head 1.  The server 2 dates is able to provide the terminal 4 a date of service in response to a request.  The server 2 is here synchronized, according to the NTP protocol, with a second reference clock external to the system.  The first and second reference clocks are, or not, the same clock.  By virtue of the hierarchical architecture, in levels called strata, associated with the NTP protocol, the first and second reference clocks are themselves in the same way, each synchronized with a reference clock of the immediately higher stratum, and thus of next, step by step and last instance, each synchronized with a reference clock of stratum 1.  At each stratum, these reference clocks are, or not, the same clock.  Here, for the head 1 and the server 2, only the differences with respect to a conventional headend and a conventional date server are described in detail.  For information about a conventional headend and a conventional date server, the reader can refer to the state of the art cited in the introduction to this patent application.  Figure 2 shows an intermediate license L.  This license L, notably includes a cryptogram (Ksi) * KGp 51 obtained by encrypting a key Ksi with an intermediate key KGp.  The key Ks, is the key used to encrypt the segment S, of the multimedia content.  The intermediate key KGp is the key used to encrypt the Ksi keys of all segments of the Gp block.  The intermediate license L also includes: an identifier Id (KGp) 50 of this intermediate key KGp, and a date TS, 53 of transmission of the segment S.  The notations used in this figure and FIG. 3 are described in more detail with reference to FIG. 5.  FIG. 3 represents an Lp license, or terminal license, of a digital rights management system.  This license includes a right of access 52, and a temporal criterion 54 of validity as defined in the introductory part of this patent application.  The access right 52 here comprises a cryptogram of this intermediate key KGp.  The license Lp also includes the identifier Id (KGp) 50 of intermediate key.  FIG. 4 represents a stream 6 transmitted by the network head 1 to the terminal 4 during the implementation of the method of FIG. 5.  Stream 6 has several blocks of media content segments.  For example, flow 6 has more than two, ten, or hundred segment blocks.  To simplify FIG. 3, only two blocks 62, 63 have been shown.  In this figure, the symbol "" between blocks 62, 63 indicates that blocks have not been represented.  Here, it is assumed that all these blocks are structurally identical and differ from each other only in the content encoded in each of the segments.  In particular, all blocks have the same number of segments.  Thus, only the structure of the block 62 will now be described in more detail.  Block 62 comprises a plurality of segments.  Typically, block 62 has more than ten or a hundred successive segments.  Block 62 has only a restricted portion of all segments whose concatenation forms the entire content.  Here only three segments 622, 623 and 624 have been shown in FIG.  The symbol "" between segments 623 and 624 indicates that other segments have not been represented.  Here, all these segments are structurally identical and differ from each other only by the information encoded in each of them.  Thus, only segment 622 is now described in more detail.  The 622 segment is consistent with the definition of the term "segment" given in the introduction to this text.  At segment 622 is associated an intermediate license 642, transmitted jointly to this segment in stream 6.  Here, this association is achieved by synchronization of the segment 622 and the intermediate license 642 in the stream.  Typically, this synchronization is achieved by the adjacency of the segment 622 and the intermediate license 642 in the stream, and, when the time comes, by their joint transmission.  The operation of the system of FIG. 1 will now be described with reference to the method of FIG. 5.  Initially, during a step 1000, in a manner known to those skilled in the art, the network head 1 obtains a temporal multimedia content in the clear.  She then encodes this content.  Then, during a step 1002, the head 1 splits the multimedia content encoded into several successive segments S of content.  These segments S, are temporally ordered with respect to each other, and their complete sequence constitutes the content.  In the remainder of this description, the index "i" is the sequence number of the segment S, in this sequence of segments.  The network head 1 then provides individual protection, by a digital rights management system, each of the segments Si.  As such, in a step 1004, it encrypts each segment S, with a key Ksi of specific content, which is not used to encrypt another segment of the same sequence of segments.  Then, during a step 1006, the network head 1 constitutes Gp blocks of successive segments.  The index "p" is the serial number of the block in the sequence of successive blocks thus constituted.  Here, the fixed network head 1 for this purpose the number of segments contained in each block.  For each block comprising this number of successive segments, it then generates an intermediate key KGp.  The intermediate key KGp is different for each block of the protected multimedia content.  Then it encrypts the encryption key Ksi of each of the segments S, of the block Gp with the intermediate key KGp.  It thus obtains for each segment S, of the block Gp the cryptogram (Ks,) * Kgp 51.  The network head 1 then inserts the identifier Id (KGp) 50 of the intermediate key KGp and the cryptogram (Ksi) * KGp 51 in the intermediate license L, which it associates with this segment S, as described with reference to the figure 3.  In parallel, for example of one of the steps 1000, 1002, 1004 and 1006, during a step 1100, the network head 1 receives from the terminal 4 a request to obtain the content.  This request contains in particular an identifier of a terminal key KT.  The KT key is here unique for each terminal.  In a manner known to those skilled in the art, the key KT was obtained by the terminal during its manufacturing or personalization phase.  The key KT was then obtained by the network head 1 during a recording phase of the terminal 4 before the implementation of the method of FIG. 5.  In response to the request received in step 1100, the network head 1 implements the steps 1200, 1202, 1204 and 1206.  In step 1200, the network head 1 encrypts each intermediate key KGp used with the key KT of the terminal 4 to obtain the cryptogram (KGp) * K-r.  Then for each Gp block, it inserts, as the access right to this block 52, the cryptogram (KGp) * KT in the terminal Lp license intended for the terminal 4.  The identifier Id (KGp) 50 of the intermediate key KGp is also inserted in the license Lp and in each license L, intermediate associated with any segment S, of the block Gp.  The license Lp is thus associated with each of the segments S 'and thus with the block Gp, by this identifier Id (KGp).  Finally, the network head 1 inserts, in the license Lp, the temporal criterion 54 of validity of this license.  For example, this criterion 54 specifies that the Lp license can only be used between January 1, 2014 and March 1, 2014.  Then, during a step 1202, the network head 1 associates with each of the segments S, its date TS, of transmission.  Here, she obtains the date of transmission of the segment S, near the clock 12.  Then, it inserts this date TS, of transmission in the license L, intermediate associated with the segment S.  Typically, this transmission date is that of the end of the calculation of the license L, intermediate associated with the segment S.  It therefore precedes, typically by a fraction of a second, the beginning of the transmission on the network 3 of this segment S.  It is preferably inserted, protected in integrity, in the license L.  The network head 1 thus generates step by step the stream 6 comprising each of the segments S, Gp block considered and its license L, associated intermediary which itself includes its date TS, transmission.  The network head 1 finally transmits, at the terminal 4, at the step 1204 the license Lp, and at the step 1206 the stream 6.  In a manner known to those skilled in the art, according to the nature of the content supply service considered and the request of the terminal, the steps 1204 and 1206 can be synchronized, or independent in time.  For example, here, the content delivery service considered is a content broadcast service, and the request received at step 1100, aims to obtain the content to play on the fly as it is received.  Step 1204 then precedes step 1206 of broadcasting the content, so that the license Lp is received and processed by the terminal 10 before the Gp block is played.  It is the same if the request received at step 1100 is to obtain the content to make, on the fly as it is received, any other use controlled by the content protection system, such as its recording.  The terminal thus receives, in a step 1300 the license Lp, and in a step 1302 the stream 6.  Correspondingly to what it is for the steps 1204 and 1206, the steps 1300 and 1302 can be synchronized, or independent in time.  For example, here, step 1300 precedes step 1302, so that the Lp license is processed by the terminal before the Gp block is played.  Next, the terminal initiates a content play phase.  During this phase, it proceeds, successively for each of the segments S, of the stream 6 received, at steps 1400 to 1422.  At the step 1400, the terminal extracts the segment S, and its license L, associated intermediate, of the stream 6.  Then, in step 1402, the terminal extracts the license L, the date TS, of transmission of the segment S.  Then, during step 1404, the terminal compares the transmission date TS, the last date of service acquired, here noted TE.  If TS is later than TE then, in step 1406, the terminal 4 replaces the value of the date TE with the value of the date TS, extracted in step 1402.  Then, again during step 1406, the terminal 4 compares this new date TE with the last date of service acquired with the server 2 of dates, here denoted TTs.  If TE is greater than TTs of at least a predetermined duration, here denoted DTE, then the terminal proceeds to step 1408 of acquisition of the date of service 35 with the server 2 of dates.  Otherwise, the terminal proceeds directly to step 1410.  This forces the terminal 4 to connect regularly to the server 2.  The predetermined duration DTE could be initialized in the terminal 4 during the production of the system, or by the operator of the service.  Its value is typically greater than ten or twenty minutes.  The value of the DTE duration is also generally less than ten, fifty, or one hundred hours.  The values of the dates TE and TTs were initially acquired by the terminal 4, during a phase, for example, called installation, activation or personalization, with the server 2 of dates, or initialized by example to zero.  In step 1404, if TSi is earlier than TE more than a predetermined duration, here noted TSW, then the terminal proceeds directly to step 1408 of acquisition of the date of service from the server 2 dates.  Thus, when the date of transmission can not be trusted, it is essentially the date of service communicated by the date server 2 that is used.  Finally, in step 1404, if TSi is between TE and TE-TSW, then the process continues directly by step 1410.  In this case, the date TE is not updated according to the date TSi extracted during the step 1402.  This situation occurs when a segment is played by the terminal with a slight delay with respect to the reception time of that segment by this terminal.  The value of the slight difference allowed here is equal to TSW.  The predetermined duration TSW could be initialized in the terminal 4 during the production of the system, or by the operator of the service.  Its value is typically greater than ten or twenty minutes.  Generally, its value is also less than one hour or ten hours.  In step 1408, the terminal 4 authenticates the server 2, for example using an electronic certificate.  The terminal 4 also transmits a date request to the date server 2, and obtains a date in return.  Only if the server 2 is authenticated successfully, then the terminal 4 acquires this date and replaces the value of the date TTs and the date TE by the value of this date obtained from the server 2.  Here, at step 1408, if the connection to the date server 2 can not be established or if the authentication fails, the terminal 4 increments a connection failure counter.  If the value of this counter does not exceed a predetermined threshold, here denoted Max_tts_bypass, the terminal 4 proceeds to step 1410 without modifying the values of the dates TTs and TE.  If the value of this counter crosses the threshold Max_tts_bypass the terminal 4 inhibits the steps 1410 and following of the method, including the extraction of the right of access to the terminal Lp license, thus prohibiting access to the segment Si.  Then, the failure counter can be reset to its initial value by the service operator.  It can also be reset automatically after a predetermined time, for example greater than 30 min or 1 h or 10 h.  The threshold Max_tts_bypass could be initialized in the terminal 4 during the production of the system, or by the operator of the service.  Its value is typically greater than two, three or five and, for example, less than ten, twenty or fifty.  In step 1410, the terminal 4 extracts from the intermediate license L, the identifier Id (KGp) 50 of the intermediate key KGp.  Then, during the step 1412, the terminal 4 searches, among the received terminal licenses, the license Lp which includes the identifier Id (KGp) 50.  In step 1414, the terminal 4 extracts the time criterion 54 of the license Lp found in step 1412.  Then it evaluates this criterion against the last TE service date acquired.  If this service date satisfies the time criterion 54, then the terminal 4 implements the steps 1416 and following of the method.  Otherwise, it inhibits steps 1416 and following of the method, including the extraction of the access right of the license Lp, thus prohibiting access to the segments and returns to step 1400 to treat the next segment S ,. i.  In step 1416, if the intermediate key KGp contained in the access right 52 has not already been extracted from the beginning of the game phase, then the terminal 4 extracted from the license Lp found in step 1412 the cryptogram (Kgp) * Kr.  Then, in step 1418, the terminal 4 decrypts the cryptogram (KGp) * KT with its terminal key KT, thus obtaining the key KGp intermediate.  Then, during step 1420, the terminal 4 decrypts the cryptogram (Ks,) * KGp with the intermediate key KGp decrypted during step 1418, thus obtaining the key KS; specific.  Finally, in step 1422, the terminal 4 decrypts the cryptogram of the segment S, with the specific key KS; obtained during step 1420, so as to obtain the segment S, in the clear.  The segment S, in clear can then be transmitted by the terminal 4 to any multimedia device to be played.  The process then returns to step 1400 to receive and play the next segment S 1. 1.  [00103] Many other embodiments of the invention are possible.  For example, the content is provided by the system for providing protected multimedia content, encrypted with several keys for its protection by the digital rights management system.  Several licenses, each containing at least one of these content keys, are then necessary for the terminal to access the content.  The claimed process then applies to at least one of these licenses.  In another embodiment, the access right 52 of the license Lp includes the intermediate key KGp and not the cryptogram (Kgp) * K-r.  In this embodiment, the terminal license is not necessary.  [00105] Alternatively, the content is provided protected by a digital rights management system without being encrypted.  The content key is not included in the access data inserted in the license.  In another embodiment, the multimedia content is provided protected by a conditional access system, or CAS, for Conditional Access System.  The terminology of the field of conditional access systems is then used.  The interested reader may for example find a more complete presentation in the document: "Functional Model of a Conditional Access System", EBU Review, Technical European Broadcasting Union, Brussels, BE, No. 266, December 21, 1995.  A segment is then a cryptoperiod, a terminal license an EMM, and the intermediate license an ECM.  The transmission date is then typically inserted into an ECM.  In another embodiment, the content is provided, by the system, protected by any other type of content protection system, such as for example a more conventional data protection system that does not manage the data. access rights.  The claimed method then applies to providing the messages necessary for the routing of the decryption keys, for example.  In another embodiment, all segments of a block of content segments do not immediately follow each other in the time course of the content.  Some of these segments are then separated by segments not belonging to the block considered.  Alternatively, a terminal shares with at least one other terminal, its encryption key and its decryption key, called terminal.  In a variant, the network 3 comprises a first unidirectional transmission sub-network of information between the head 1 and the terminal 4 and a second sub-network for the bidirectional transmission of information between the server 2 and the terminal 4.  For example, the first subnet is a satellite transmission network and the second subnet is the Internet network.  [00111] In a variant, the clock 12 of the head 1 is synchronized with a reference clock 25 according to a distinct NTP protocol.  In another variant, the clock 12 is synchronized with the date server 2.  In another variant, the clock 12 is synchronized with a reference clock internal to the head 1.  In a last variant, the clock 12 is itself a reference clock internal to the head 1.  Similarly, the date server 2 can be synchronized with a reference clock according to a separate NTP protocol.  In another variant, the server 2 itself comprises a reference clock with which it is synchronized.  It is also possible that the clock 12 and date server 2 are synchronized with reference clocks according to different protocols.  In a variant, the date server 2 is integrated with the network head 1.  [00113] The number of blocks and segments per block may vary.  For example, stream 6 has a single block of content segments.  In another variant, each block comprises a single segment.  In another embodiment, the number of segments in each block is not necessarily the same from one block to another.  The transmission date TS segment 622 can be inserted into a message or a data structure other than the intermediate license associated with this segment.  However, this message or this other data structure is transmitted together with the segment and the intermediate license.  For example, the transmission date is adjacent to each segment transmitted in the stream but is not part of the data structure forming the license L.  [00115] Other embodiments of the Lp license are possible.  For example, the head 1 may, in step 1200, to complete the access right 52 of the license Lp, combine additional rules or access criteria with the cryptogram (KGp) * K-r.  In step 1416, these additional rules or criteria are then also extracted from the access right 52 by the terminal 4 and evaluated.  The success of this evaluation then conditions the implementation of step 1418 of decryption of the cryptogram (KGp) * KT.  In a variant, the network head 1 obtains the date of transmission of a segment from the date server 2, or a third date server external to the system of FIG. 1.  Alternatively, the content supply service considered is a content broadcast or download service whose registration is not controlled by the content protection system, and the request received at step 1100 is to get the content to save it for later play.  Steps 1204 and 1206 then do not respond to any synchronization constraints, so that, depending on the dynamics of the service, they can be simultaneous or succeed one another in either order.  It is the same with steps 1300 and 1302.  In another variant, the predetermined duration TSW is not used.  This amounts to taking this duration TSW equal to zero at step 1404 of the method of FIG. 5.  Likewise, it is not necessary to use the predetermined duration DTE.  This therefore amounts to considering that in step 1404 of FIG. 5, the duration DTE is infinite.  In this case, updating the TTs date is triggered otherwise.  For example, this update is triggered periodically or after receiving a predetermined number of segments S, to be decrypted.  In a variant, during step 1408, if the value of the connection failure counter exceeds the threshold Max_tts_bypass, the terminal 4 inhibits the steps 1410 and following of the method, in particular the extraction of the access right of the terminal Lp license, and for example ends the game phase of the protected multimedia content.  [00120] Alternatively, the terminal 4 does not have a failure counter connection to the date server 2.  Thus, in step 1408, the first time that the connection to this server can not be established, the terminal inhibits the extraction of the license access right thus prohibiting access to the segments.  In step 1414, if the last acquired service TE date does not satisfy the time criterion 54 of the Lp license found at step 1412, the terminal may seek or attempt to exploit another license including identifier Id (KGp) 50 of the intermediate key KGp.  In another variant, it inhibits the steps 1416 and following of the method, including the extraction of the right of access to the terminal Lp license, and for example ends the game phase of protected multimedia content.
权利要求:
Claims (10)
[0001]
REVENDICATIONS1. A method of providing to a terminal multimedia contents protected by a multimedia content protection system, wherein: during a transmission phase, a head end: a) associates (1200) with a block of segments of multimedia content, a right of access necessary to the terminal to access any segment of this block to play it, and a license with the right of access and a time criterion of validity, each of these segments comprising least one series of video image groups or 10 audio frames, this block comprising one or more segments, b) transmits (1204, 1206) to the terminal the license and a stream comprising each segment, during a reception phase, the terminal: c) receives (1302) the stream of multimedia content segments, d) receives (1300) the license, during a segment play phase, the terminal: e) authenticates (1408) a date server and, only if the date server is authenticated successfully, acquires (1408) a date of service from this date server, f) evaluates (1414) the time criterion of the license against the last acquired date of service, then, if the result of the evaluation is positive, extract (1416, 1418) the right of access of the license thus allowing access to the segments and, otherwise, inhibits (1414) the extraction of the access right of the license thus prohibiting access to the segments, 25 process characterized in that: during step b), the headend associates (1202) each segment with its transmission date, and transmits it (1206) in the stream together with the segment, then, during the phase in a step g), the terminal extracts (1400, 1402) from the stream, together with a segment, the transmission date of the segment, acquires it (1406) as a service date, and uses (1414) as the last service date acquired during an execution of step f) between two successive executions of step e).
[0002]
2. Method for obtaining, by a terminal, for the implementation of the method of claim 1, protected multimedia contents, wherein the terminal: during the reception phase: - in step c), receives (1302) a stream comprising each segment of the block of media segments, - in step d), receives (1300) a license with a necessary access right to the terminal to access any segment of the block for the purpose of play, and a time criterion of validity, during the segment play phase: in step e), authenticates (1408) a date server and, only if the date server is successfully authenticated, acquires ( 1408) a service date from this date server, 10 - in step f), evaluates (1414) the time criterion of validity of the license against the last acquired date of service, and then, if the result of the evaluation is positive, extract (1416, 1418) the right of access of the license thus allowing the ccess to the segments and, otherwise, inhibits (1414) the extraction of the access right of the license thus prohibiting access to the segments, 15 characterized in that during the game phase, in step g) , the terminal extracts (1400, 1402) from the stream, together with a segment, the transmission date of this segment, acquires it (1406) as a service date, and uses it (1414) as the last date of service acquired during an execution of step f) between two successive executions of step e). 20
[0003]
The method of claim 2, wherein the terminal, in step g), compares (1404) the retrieved date of transmission to the last acquired date of service, and, only if the retrieved date of retrieval is later than the retrieved date of retrieval. this latter date of service, acquires it as a date of service, and uses it as the last date of service acquired during the next execution of step f).
[0004]
A method according to any of claims 2 and 3, wherein the terminal, in step g), compares the retrieved date of transmission with the last acquired date of service, and only if the retrieved date of transmission is prior to this last service date of not more than a first predetermined duration, then the last acquired service date is maintained (1404) unchanged and step f) is executed using this last acquired service date kept unchanged.
[0005]
5. A method according to any one of claims 2 to 4, wherein the terminal, in step g), compares (1406) the retrieved date of transmission to the date of service acquired at the last execution of the step e), and triggers (1406) a new execution of step e) if the difference between the extracted transmission date and this service date is greater than a second predetermined duration and, otherwise, does not trigger ( 1406) this new execution of step e) in response to this comparison.
[0006]
The method of any one of claims 2 to 5, wherein, in step e), if the connection to the date server can not be established, in response, the terminal inhibits (1408) the extraction of the right of access of the license thus prohibiting the access to the segments.
[0007]
7. The method of claim 6, wherein: the terminal counts (1408) the number of consecutive times when the connection to the date server can not be established, and in response to the crossing by this number of a predetermined threshold, inhibits (1408) the extraction of the access right of the license thus preventing access to the segments and, if not, authorizes (1408) the extraction of the access right of the license thus allowing access to the segments.
[0008]
The method of any one of claims 2 to 7, wherein, between two consecutive executions of step f), the terminal retrieves (1402) one or more received segment transmission dates and, at each retrieval of a transmission date subsequent to the last acquired service date, the terminal acquires it (1406) as a service date, to be used as the last date of service acquired during the next execution of step f). 25
[0009]
9. An information recording medium, characterized in that it comprises instructions for the implementation of a method according to any one of claims 2 to 8, when these instructions are executed by an electronic computer. 30
[0010]
Terminal (4) for carrying out a process for obtaining multimedia contents according to any one of Claims 2 to 8, in which the terminal is able: during a reception phase: c) receiving a stream comprising each segment of a block of multimedia content segments, each of these segments comprising at least one sequence of groups of video images or audio frames, d) to receive a license including a right of access necessary for the terminal to access any segment of the block in order to play it, and a time criterion of validity, during a phase of game segments: e) to authenticate a date server and, only if the date server is 5 successfully authenticated, to acquire a date of service from that date server, f) to evaluate the temporal validity criterion of the license against the last date of service acquired, then, if the result of the evaluation is positive, to extract the right of access from e the license thus allowing access to the segments and, if not, to inhibit the extraction of the access right of the license thus prohibiting access to the segments, terminal characterized in that it comprises an electronic calculator (44) programmed, during the game phase, to implement a step g) during which it extracts from the stream, together with a segment, the transmission date of this segment, acquires it as a date of service, and uses it as the last service date acquired during an execution of step f) between two successive executions of step e).
类似技术:
公开号 | 公开日 | 专利标题
EP3114598B1|2017-11-22|Method for providing protected multimedia content to a terminal
EP1827019A1|2007-08-29|Conditional access method to conditional access data
CA2473166A1|2003-07-31|Device for secure transmission recording and visualisation of audiovisual programmes
WO2003065725A1|2003-08-07|Secure device that is used to process high-quality audiovisual works
EP1527605A2|2005-05-04|Device for scrambling mpeg-4-type audio-visual and multimedia content
EP2567500B1|2017-04-19|Method, recording medium and server for decryption, transmission and reception of the control words
WO2004056114A1|2004-07-01|Synchronisation of secure audiovisual streams
FR2851112A1|2004-08-13|Audiovisual sequence distributing method, involves transmitting nominal flow having digital information apt to allow reconstruction of nominal flow, and calculating synthesis of flow according to two flows generated from server
EP3317799B1|2019-03-27|Method for providing protected multimedia content
WO2015018775A1|2015-02-12|Method of providing a licence in a system for providing multimedia contents
EP3380983B1|2020-08-26|Method for the identification of security processors
FR2957737A1|2011-09-23|METHOD AND SYSTEM FOR SECURE DIFFUSION OF A DIGITAL DATA STREAM
EP3008905B1|2018-11-14|Terminal identification method in a system for providing multimedia content
EP3170296B1|2020-01-01|Method of access to a multimedia content protected by a terminal
FR2786973A1|2000-06-09|Security device for decoding compressed encrypted data has safe microcircuit in magnetic card separate from case and also includes decompression circuits
EP1755338A1|2007-02-21|Method and system for transmission and reception ofencrypted multimedia data
EP1554879B1|2010-03-31|Device for the transformation of mpeg-2-type multimedia and audiovisual content into secure content of the same type
EP2326035B1|2015-05-27|Treatment method involving a message security module for controlling access to content and associated security module
WO2000011866A1|2000-03-02|Security device for decoding compressed encrypted data
同族专利:
公开号 | 公开日
PL3114598T3|2018-04-30|
ES2657798T3|2018-03-06|
US10091178B2|2018-10-02|
FR3018125B1|2017-07-21|
CN106062758B|2019-07-26|
TWI539804B|2016-06-21|
US20170070496A1|2017-03-09|
EP3114598A1|2017-01-11|
TW201536046A|2015-09-16|
CN106062758A|2016-10-26|
EP3114598B1|2017-11-22|
WO2015132500A1|2015-09-11|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
EP1376304A2|2002-06-17|2004-01-02|NTT DoCoMo, Inc.|Communication terminal for restricting the use of content|
EP1806672A2|2005-12-06|2007-07-11|Samsung Electronics Co., Ltd.|Device and method for storing current time information|
US20140033323A1|2012-07-27|2014-01-30|Motorola Mobility Llc|Secure Time for Mobile Devices|
US6889212B1|2000-07-11|2005-05-03|Motorola, Inc.|Method for enforcing a time limited software license in a mobile communication device|
US7299209B2|2001-10-18|2007-11-20|Macrovision Corporation|Method, apparatus and system for securely providing material to a licensee of the material|
US7146504B2|2002-06-13|2006-12-05|Microsoft Corporation|Secure clock on computing device such as may be required in connection with a trust-based system|
FR2868654B1|2004-04-06|2007-06-22|Medialive|METHOD AND SYSTEM FOR SECURE DIFFUSION OF AUDIOVISUAL FLOWS PROTECTED AT A DYNAMIC GROUP OF RECEIVERS|
JP4161936B2|2004-04-27|2008-10-08|ソニー株式会社|Time setting system, time setting method|
WO2006095726A1|2005-03-11|2006-09-14|Brother Kogyo Kabushiki Kaisha|Information distribution system, node device, and release data issuing method, etc.|
US8438645B2|2005-04-27|2013-05-07|Microsoft Corporation|Secure clock with grace periods|
US8327448B2|2005-06-22|2012-12-04|Intel Corporation|Protected clock management based upon a non-trusted persistent time source|
US20070008969A1|2005-07-05|2007-01-11|Elstermann Erik J|Apparatuses and methods for delivering data stream content to consumer devices|
US8195124B2|2006-02-23|2012-06-05|Qualcomm Incorporated|Apparatus and methods for managing time sensitive application privileges on a wireless device|
GB0606962D0|2006-04-06|2006-05-17|Vodafone Plc|Secure Module|
US8688588B2|2007-06-08|2014-04-01|Sandisk Technologies Inc.|Method for improving accuracy of a time estimate used in digital rights management license validation|
US8646096B2|2007-06-28|2014-02-04|Microsoft Corporation|Secure time source operations for digital rights management|
KR101418591B1|2007-10-05|2014-07-10|삼성전자주식회사|Apparatus and method for announcing service guides in mobile communication system|
KR101448122B1|2007-11-07|2014-10-07|삼성전자 주식회사|Management device for rights management of time based digital rights management and method thereof|
US8646027B2|2008-06-27|2014-02-04|Microsoft Corporation|Workflow based authorization for content access|
US8387150B2|2008-06-27|2013-02-26|Microsoft Corporation|Segmented media content rights management|
US8448009B2|2009-08-17|2013-05-21|Sandisk Il Ltd.|Method and memory device for generating a time estimate|
US8789196B2|2010-05-28|2014-07-22|Adobe Systems Incorporated|System and method for providing content protection of linearly consumed content with a bidirectional protocol for license acquisition|
FR2967002B1|2010-10-27|2012-12-14|Viaccess Sa|METHOD FOR RECEIVING A CONTAMINATED MEDIA CONTENT USING CONTROL WORDS|
US8793492B2|2011-01-13|2014-07-29|Adobe Systems Incorporated|Methods and systems for scalable distribution of protected content|
US8751800B1|2011-12-12|2014-06-10|Google Inc.|DRM provider interoperability|
WO2014129922A1|2013-02-21|2014-08-28|Общество С Ограниченной Ответственностью "Протекшен Технолоджи Ресеч"|Method for managing licences in a drm system|JP6201835B2|2014-03-14|2017-09-27|ソニー株式会社|Information processing apparatus, information processing method, and computer program|
AU2017348370A1|2016-10-28|2019-06-13|Axon Enterprise, Inc.|Systems and methods for supplementing captured data|
CN106878284A|2017-01-13|2017-06-20|北京元心科技有限公司|The control method and device of media play function in multisystem|
US20200245040A1|2019-01-25|2020-07-30|International Business Machines Corporation|Securing and segmental sharing of multimedia files|
US10860457B1|2019-02-15|2020-12-08|Amazon Technologies, Inc.|Globally ordered event stream logging|
法律状态:
2016-03-28| PLFP| Fee payment|Year of fee payment: 3 |
2017-03-23| PLFP| Fee payment|Year of fee payment: 4 |
2018-03-19| PLFP| Fee payment|Year of fee payment: 5 |
2019-11-29| ST| Notification of lapse|Effective date: 20191106 |
优先权:
申请号 | 申请日 | 专利标题
FR1451666A|FR3018125B1|2014-03-02|2014-03-02|METHOD FOR PROVIDING PROTECTED MULTIMEDIA CONTENTS TO A TERMINAL|FR1451666A| FR3018125B1|2014-03-02|2014-03-02|METHOD FOR PROVIDING PROTECTED MULTIMEDIA CONTENTS TO A TERMINAL|
ES15709296.6T| ES2657798T3|2014-03-02|2015-02-20|Method of supplying, to a terminal, protected multimedia content|
PCT/FR2015/050424| WO2015132500A1|2014-03-02|2015-02-20|Method for providing protected multimedia content to a terminal|
US15/122,764| US10091178B2|2014-03-02|2015-02-20|Method for supplying protected multimedia content to a terminal|
CN201580011426.XA| CN106062758B|2014-03-02|2015-02-20|The method for providing the terminal with shielded multimedia content|
PL15709296T| PL3114598T3|2014-03-02|2015-02-20|Method for providing protected multimedia content to a terminal|
EP15709296.6A| EP3114598B1|2014-03-02|2015-02-20|Method for providing protected multimedia content to a terminal|
TW104106269A| TWI539804B|2014-03-02|2015-02-26|Method for supplying protected multimedia content to a terminal|
[返回顶部]