System and method for dynamically allocating stream identifiers in a multi-encryption transport system

ABSTRACT

The present invention is suitable for use in a multi-encrypted system that dynamically allocates stream identifiers in a second stream depending upon the identifiers in a first stream. The first stream is monitored and counters are incremented with the presence of an identifier. The count for each of the counters is then received. Using the count, a control processor then assigns or revises identifiers in the second stream.

The present application is related to U.S. application Ser. No.11/383,375 also entitled “SYSTEM AND METHOD FOR DYNAMICALLY ALLOCATINGSTREAM IDENTIFIERS IN A MULTI-ENCRYPTION TRANSPORT SYSTEM”, to the sameinventors, which is incorporated herein by reference, and having beenfiled concurrently with the present application.

FIELD OF THE INVENTION

The present invention relates generally to the field of dual-encryptedstreams in a communications system and more specifically towardsdynamically allocating stream identifier information of a secondarystream in the system.

BACKGROUND OF THE INVENTION

Cable communications systems typically transmit encrypted data streamsaccording to a single proprietary scheme. Accordingly, cable operatorsmust purchase decryption, or set-top, devices, which reside at thesubscriber's premises, that decrypt the data streams according to theproprietary encryption scheme. Obviously, it is to the cable operator'sand the subscriber's benefit to be able to source multiple set-topshaving different decryption schemes instead of having to choose just asingle decryption set-top for the system. In this light, an operator nowhas an option of installing an overlay system, which allows for multipleencryption schemes and likewise multiple decryption devices that eachdecrypts one of the encrypted streams.

In an overlay system, however, special precautions should be taken toensure multiple encrypted transport streams are not in conflict or donot collide. It will be appreciated that in a conventionalcommunications system, there are varying levels of streams that comprisea transport stream. Very generally, a transport stream comprises aplurality of programs where each has a program number. Each of theprogram streams comprises video, audio, and data elementary streams.Furthermore, each elementary stream comprises video, audio, or datapackets. A program number in a program association table (PAT)identifies each program and an associated program map table (PMT). EachPMT then identifies the elementary streams with packet identifiers(PIDs). The program numbers and PIDs are initially chosen out of a wellknown fixed range of numbers defined in the MPEG specification.Therefore, there exists a chance that two separate transport streamscoming from different service providers that are transmitted using thesame system, may include common identifiers (e.g., program numbers andPIDs) causing the two streams to overlap, thereby presenting programnumbers and/or elementary stream packets that do not have uniqueidentifying stream values, but are intended for two different decryptiondevices. In this case, a decryption device receives the encrypted streamwith packets having different encryption schemes using the sameidentifier and may try to decrypt the wrong streams, which would thencause several problems. Accordingly, there exists a need to discover,monitor, and dynamically change the identifiers and stream routes in thetransport streams in such a system to ensure that conflicts do notarise.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a simplistic block diagram of an overlay system thattransports multiple encrypted streams with different encryption schemesto multiple decryption devices.

FIG. 2 illustrates a primary encrypted program association table (PAT)that is periodically transmitted along with the transport stream thatthe primary decryption devices access in order to locate a desiredprogram and its components in the transport stream

FIG. 3 illustrates an original overlay PAT that is periodicallytransmitted along with the transport stream that both the secondary andprimary decryption devices access in order to locate a desired programand its components in the transport stream.

FIG. 4 illustrates an updated primary encrypted PAT.

FIG. 5 illustrates an updated overlay PAT having a version 2 inaccordance with the present invention,

FIG. 6 illustrates an original overlay program map table (PMT) and anupdated overlay PMT in accordance with the present invention.

FIG. 7 is a block diagram of a processing, or encryption, device andcontrol system that monitor, detect, and revise any conflicts in theprogram numbers and/or packet identifiers in accordance with the presentinvention.

FIG. 8 is a block diagram of a continuous PID-monitoring processingdevice that is suitable for use in a GIGA Ethernet or a packet switchedenvironment in accordance with the present invention.

DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT

The present invention will be described more filly hereinafter withreference to the accompanying drawings in which like numerals representlike elements throughout the several figures, and in which an exemplaryembodiment of the invention is shown. This invention may, however, beembodied in many different forms and should not be construed as beinglimited to the embodiments set forth herein; rather, the embodiments areprovided so that this disclosure will be thorough and complete, and willfully convey the scope of the invention to those skilled in the art. Thepresent invention is described more fully hereinbelow.

The present invention is suitable for use in a MPEG transportcommunications system that transmits multiple streams that use differentencryption schemes over one system to receiving devices having multipledecryption schemes. The present invention allows for at least twodifferent decryption devices (e.g., a primary set-top and a secondaryset-top) to be located in a single system, which transmits streamshaving a primary encryption scheme and at least one other encryptionscheme (i.e., an overlay, or secondary, encryption scheme). Each set-topis designed to decrypt either the primary or the secondary encryptionscheme at one time. Prior to combining the multiple streams and inaccordance with the present invention, a processing device analyzes themultiple encrypted streams to discover and monitor the program numbersand packet identifiers of the primary and secondary streams to ensurethat any conflicts in the overlay streams and identifiers are correctedprior to transmission. More specifically, if a conflict is detected(i.e., the primary stream and the secondary stream have a same programnumber and/or packet identifier), the present invention dynamicallychanges the common identifier(s) in the secondary stream to a differentidentifier that is unique and does not conflict with any of theassociated primary encrypted streams. Accordingly, the multiple streamsare transmitted having different program numbers and/or packetidentifiers Additionally, the secondary, or overlay, decryption devicesin the system are notified of the changed identifier(s) in the secondarystream to ensure proper processing and subsequent display.

FIG. 1 is a simplistic block diagram of an overlay communications systemthat transports multiple encrypted streams with different encryptionschemes to multiple decryption devices. In a headend facility, anoverlay encryption device 105, such as, but not limited to, a quadratureamplitude modulation (QAM) modulator, receives a primary encrypted inputstream 115 and a matching clear input stream 120. It will be appreciatedthat several encryption devices exist in the headend facility eachreceiving a copy of the primary encrypted input steam and the clearinput stream according to predetermined configurations; however, onlyone encryption device 105 is shown for simplicity. The overlayencryption device 105 manipulates the primary encrypted input stream 115and the clear input stream 120 to provide a partial dual encryptedstream 125 (i.e., a combined overlay output stream). The combinedoverlay output stream 125 comprises selected packets from the primaryencrypted input stream and matching packets from the clear input streamthat have been encrypted with a secondary encryption scheme combinedwith the remaining packets in the clear input stream. For example, 2% ofpackets included in the primary encrypted stream are chosen from theprimary encrypted input stream. Matching packets of the clear inputstream are then encrypted with the secondary encryption scheme The 2%primary encrypted packets and the 2% secondary encrypted packets arethen combined providing a 4% combined encrypted overlay stream. The 4%combined stream is subsequently combined with the 98% remaining clearinput stream to provide 102% combined content packets in the combinedoverlay output stream 125. The combined overlay output stream 125 isthen provided to multiple decryption devices 130, 135, where somedevices 130 may have decryption schemes according to the primaryencryption scheme that decrypt the primary 2% encrypted content Otherdevices 135 may have decryption schemes according to the secondaryencryption scheme that decrypt the 2% encrypted content of the secondaryencrypted stream. It will be appreciated that both devices 130, 135receive and process the 98% clear stream. Further information regardinga dual-encrypted communications system can be found in copending U.S.patent application Ser. No. 10/629,839 entitled “Methods and Apparatusfor Providing a Partial Dual-Encrypted Stream in a Conditional AccessSystem” filed Jul. 30, 2003, the disclosure and teachings of which arehereby incorporated by reference.

A control system (CS) 140 provides complete management, monitoring, andcontrol of the system's elements and broadcast services provided tousers. Specifically in an overlay system, the control system 140 handlesthe provision and control information between the secondary decryptiondevices 135 and the overlay encryption device 105. In this manner, theCS 140 controls the output stream program numbers while the encryptiondevice 105 controls all the packet identifiers for the secondaryencrypted stream. Accordingly, the CS 140 and the overlay encryptiondevice 105 discover and continuously monitor all program numbers andpacket identifiers in the primary encrypted stream, and depending uponany conflicts, the program numbers and packet identifiers for thesecondary encrypted stream are dynamically changed to avoid anyconflicts in the combined output overlay stream 125.

FIG. 2 illustrates a primary encrypted input program association table(PAT) 200. In an overlay system, this PAT is then parsed, recreated,combined with secondary program information, and then periodicallytransmitted along with the other components in transport stream 115. Theprimary decryption devices 130 access the combined overlay PAT 305 inorder to locate a desired program and its components in the transportstream. In a non-overlay system, the receiving devices 130 identify andsubsequently receive the PAT 200 by its reserved PID value of 0x0 203.The PAT 200 contains a list of all program numbers (PNs) 205 availablein that transport stream and their associated program map table (PMT)PID values 210 for each program. A program is also known as a sessionsince sessions reference a specific program in a transport stream. EachPMT PID value 210, for example, a PMT PID value of 0x250, in the primaryencrypted input PAT 200 is associated with a PMT 215 that includes theelementary stream PID values of 0x500, 0x510, and 0x520. Morespecifically, the PMT 215, which is identified by program number 0x20,and associated by the PMT PID value of 0x250, identifies the video andaudio packets 220 for the associated program. In accordance with thepresent invention, the secondary decryption devices 135 will not tune toprogram 0x20 in the example primary encrypted input PAT 200 and itsassociated PMT and alternatively accept their intended PAT and PMTvalues via their respective identifiers.

FIG. 3 illustrates an original output overlay program association table(PAT) (PID 0x0) that is periodically transmitted along with thetransport stream that both the secondary and the primary decryptiondevices access in order to locate a desired program and its componentsin the transport stream. The output overlay PAT 305 transported in thecombined output overlay stream 125 includes a PAT section that comprisesthe entire primary input encrypted PAT section 315 along with the addedoverlay program encrypted PAT section 325 for the secondary decryptiondevices 135. As mentioned, the secondary decryption devices 135 areinstructed to tune to the transport stream for their associated programnumbers included in the output overlay PAT 305 by looking for the PIDvalue of 0x0 and subsequently searching the overlay program encryptedPAT section 325 for the desired program number (PN). The program numbersthen identify program map tables (PMTs) by a PID value that includepacket identifiers for the program stream packets in the combined outputoverlay stream 125.

The primary and secondary PAT sections 315, 325 are combined in thecombined overlay output stream 125. The output overlay PAT 305 is sharedbetween the two encryption systems and will contain the entire primaryencrypted PAT programs along with the active secondary encryptedprograms. The encryption device 105 performs primary encrypted input PIDmonitoring to dynamically reallocate PID and program number values toavoid any conflicts with the primary encrypted stream 115 in thecombined overlay output stream 125. It will be appreciated that theprimary encrypted stream PAT section 315 remains untouched and theprimary encrypted stream flows without any conflicts between the primaryand the secondary encrypted streams.

FIG. 4 illustrates an updated program number in the primary encryptedPAT 400. In conjunction with FIG. 3, it is noted that the updatedprimary input encrypted PAT 400 now has a program number conflict in theoverlay program encrypted PAT section 325 with program number 0x40,which is active in the secondary encrypted stream, and a PMT PIDconflict with program number 0x60, which is also active in the secondaryencrypted stream. In accordance with the present invention, theconflicts are detected prior to transmitting the primary and secondaryencrypted streams.

FIG. 5 illustrates an updated overlay PAT (version 2) 505 in accordancewith the present invention. Due to the program number 0x40 conflict, thesecondary encrypted output program number 0x40 is changed to a newunused program number 525; in this case program number 0x45 is used.Furthermore, the updated encrypted input PAT program number 0x40 uses aPMT PID value of 0x400. Therefore, the updated primary encrypted streamPMT PID (i.e., 0x400) also conflicts with a PMT PID (i.e., 0x400)associated with program number 0x60 in the secondary encrypted stream.In accordance with the present invention, the conflict is detected, andthe PMT PID 0x400 is changed to an unused PMT PID, which in this exampleis a value of 0x450. The updated output overlay PAT 505 that includesthe updated primary encrypted input PAT section 520, the dynamicallyupdated overlay program encrypted PAT section 515, and their associatedPMT sections is then transmitted to both the primary and the secondarydecryption devices 130, 135.

The updated overlay output PAT 505 having an incremented version numberis used to signal the primary and the secondary decryption devices 130,135 of the changed overlay stream values. Accordingly, the primarydecryption devices 130 will correctly tune to program number 0x40 havinga PMT PID value of 0x400, and the secondary decryption devices 135 willcorrectly tune the program stream using the new program number 0x45having a PMT PID value of 0x200. It will be appreciated that the PMT PIDassociated with the revised program number 0x45 may not change if thePMT packet identifiers do not conflict with any active encrypted inputstream using a PMT PID value of 0x200; therefore, the video and audioelementary packets for program number 0x45 are still located in a PMTusing the PID value of 0x200. This is just an example and the algorithmis not limited or required to use the same PMT PID value for the updatedstream now using program number 0x45. Additionally, the secondarydecryption devices 135 correctly tune to program number 0x60 having anupdated PMT PID value of 0x450.

FIG. 6 illustrates an original overlay program map table (PMT) and anupdated overlay PMT in accordance with the present invention. Theoverlay PMT 605 has a PID value of 0x300 that is associated with aprogram number value of 0x50 shown in FIG. 3. In this example, however,the video PID value of 0x500 conflicts with a primary encrypted PMT PID0x500 for the primary video stream as shown in the primary encrypted PMT215 (FIG. 2). In accordance with the present invention, the conflict isdetected and the conflicting overlay PID value of 0x500 615 is changedto an unused PID value of 0x550 620. The updated overlay PMT 610 is thentransmitted along with the combined overlay output stream 125. Theremaining PIDs in the PMT 605 do not require any modification sincethere is no conflict.

FIG. 7 is a block diagram of a processing, or encryption device 705 thatmonitors, detects, and dynamically updates the secondary encryptedstream to correct for any conflicts in the program numbers and/or packetidentifiers in accordance with the present invention. The exampleprocessing device 705 includes two asynchronous serial interface (ASI)input ports using 8192 32-bit counters at each port. A bank of counters710 receives the primary encrypted input stream 115 and the matchingclear input stream 120 through the input ports. Each counter 710(1-n) isused to monitor the primary encrypted input stream PID activity for all8192 available PID values. In the discovery phase, each counter isoriginally set at 0. For each program number and packet identifierpresent in the primary encrypted input stream, a counter 710(1-n)associated with the present program number and every associated packetidentifier is incremented by one. The processing device 705 monitors allcounter values to detect which counters 710(1-n) have a value of zeroand which counters 710(1-n) have a value greater than zero. It can thenbe determined that the counters 710(1-n) having a value of zero have hadno activity and are available for the output overlay programs and packetidentifiers for the secondary encrypted overlay output streams. Anycounters 710(1-n) having a count value greater than zero indicate PIDactivity and are currently in use by the primary encrypted stream and,therefore, should not be used in any secondary overlay stream. Using thediscovered PID information, the processing device 705 either initiallyassigns or changes the PAT and PMT sections for the secondary overlaystreams to use values that do no conflict with the primary encryptedstream values.

At times, a program number and/or packet identifier in the primarystream may dynamically change and start using new stream PID and/orprogram number values. For these cases, a monitoring phase continues tomonitor the counters 710(1-n) for any updated changes. Accordingly, if apreviously unused program number and/or packet identifier is laterdiscovered in the primary encrypted input stream and that new identifieris conflicting with an already assigned identifier in the secondaryoverlay output stream, the processing device 705 updates the PAT and/orthe PMT for the overlay output stream depending upon the stream valuesthat changed. The updated PAT and/or PMT section is then immediatelytransmitted in the combined overlay output stream 125 to the secondarydecryption devices 135 to signal the stream changes. Preferably, theprimary encrypted input stream is gated until the updated overlay PATand/or PMT are transmitted and stream routes are updated to ensure nodisruption or conflict prior to the revision. Additionally, it will beappreciated that at some point, the counters 710 a-n may become full; atwhich point, the counters 710 a-n may be reset and the monitoring phasecontinues with identifying the program numbers and packet identifiers inuse.

A critical packet selector and mapper 720 selects predetermined criticalpackets of the clear input stream. The critical packets are thenencrypted with the second encryption scheme. The secondary encryptedpackets are then mapped having an appropriate PID value in the PMTand/or PAT tables in accordance with the present invention. The tables,the primary and secondary encrypted packets, and the clear packets aresubsequently multiplexed by multiplexer 725 to provide a combinedoverlay stream 730.

It will be appreciated that the processing device 705 of FIG. 7 workswell in an environment or product that is limited to a small number ofinput ports. The PID and program number monitoring is performed afterpowering the processing device 705 and continues to monitor the primaryencrypted input streams so the processing device 705 may quickly detectany dynamic PID and/or program number changes that affect the combinedoverlay output stream 125. Additionally, it is known that in a GIGAEthernet or packet switching environment, products are designed tosupport a large number of unique input streams as compared to the ASIenvironment, which usually only supports a small number of unique inputstreams. Therefore, a large amount of memory would be required to keeptrack of the 8192 32-bit PID counters for each of the unique inputsteams in a GIGA Ethernet or packet switching environment.

FIG. 8 is a block diagram of a continuous PID-monitoring processingdevice 805 that is suitable for use in a GIGA Ethernet or packetswitching environment in accordance with the present invention.Advantageously, the PID-monitoring processing device 805 is capable ofreceiving many more GIGA Ethernet or packet switched streams that arecomprised in the primary encrypted input stream 115 while not requiringan inordinate amount of memory. Additionally, continuous monitoring ofthe streams will detect any dynamic stream changes after the initialpower-up of the processing device 805. Therefore, in accordance with thepresent invention, the continuous PID-monitoring processing device 805initially goes through a discovery phase and then continuously monitorsthe encrypted input stream 115 to detect any dynamic PID changes to theprimary encrypted stream and makes changes to the output overlay stream730, accordingly; thereby, avoiding duplicated PIDs that causecollisions in the combined overlay stream 730.

The continuous PID-monitoring device 805 includes a processor 810 thatreceives the primary encrypted stream 115. The processor 810 uses asingle bit value, which corresponds to 16 bit values that comprise aPID, for each PID and a reset method to determine if any of the 8192 PIDstreams are active. The PID counters are continuously updated to aset/active state when any PID activity is detected The algorithm readsal I the PID bit counters, and then resets all the counters, and entersback into the PID discovery mode. This method will catch the PIDactivity that fluctuates between active and not active so the PIDcounter states will not become stale. Using the bit method to indicateand store the PID activity saves memory in comparison to the processingdevice 705 of FIG. 7 and allows 8192 PID values to be stored in only1024 bytes of memory. Initially at power up of the PID-monitoring device805, the PID values of the primary stream are discovered and marked as“in-use.” The in-use values are stored in a table indicating that theyare currently allocated, or unavailable. Additionally, unallocated orfree PID values are stored in a table that can be used by the secondaryoverlay steam.

The systems and methods described herein solve any duplicate identifiersby continuously monitoring and subsequently dynamically changing streamidentifier values. At times, however, physical routes transporting thesteams from the multiple encryption devices 105 may have to be changedin order to ensure that there are no cross stream issues with decryptiondevices 130, 135 that are currently watching a program. By way ofexample, assume a secondary decryption device 135 is viewing a baseballgame on program number 0x17 with a video PID of 0x50 and an audio PID of0x51. Due to a PID conflict with an adult channel, which may have justbeen added to the system, the processing device 705, 805 changes theoverlay program number 0x17 that have PIDs 0x500 and 0x501,respectively. If the decryption device 135 doesn't dynamically changeits PIDs to the updated PIDs, a cross stream issue will arise and itwill begin to decrypt the adult channel having PIDs 0x50 and 0x51.Therefore, it is extremely important that programs are received only bythe intended primary and secondary decryption devices 130, 135.

Accordingly, the physical connection between the input and the output ofthe processing device 705,805 is changed to eliminate a cross streamissue. If the route stays open with the original parameters after thestream changes, this may create the cross strewn issue since thephysical connection from the input to the output is not updated. Thecontrol of the routes can be in an ASIC, in an FPGA, or code in aprocessor. The routes are set up to pass the data based on theinformation in the stream like PID value, User Datagram Protocol (UDP)port value, and Internet Protocol (IP) value. When a specific streamvalue like an identifier changes, the processing device 705, 805recognizes the change and updates the route for that stream.

Additionally, a return PID first-in first-out (FIFO) system and methodis used to store PID values that are in the process of being deleted andreturned to the PID allocation table so that these values are notimmediately allocated to any new secondary overlay program that iscreated. In a preferred embodiment, a 16bit PID array is used. It willbe appreciated, however, that the size can be scaled depending upon theprocessing device 705, 805 and the application. Each entry in the PIDarray will hold a PID value to return to the PID allocation table. Afterthe FIFO PID array fills up, the code starts returning the oldest PIDvalue to an unallocated status. The PID values may also be stored in NVMand restored to the PID allocation table and return PID FIFO afterpowering on the processing device 705, 805. In this manner, cross streamissues are minimized.

It will be appreciated that modifications can be made to the embodimentof the present invention that is still within the scope of theinvention. Additionally, the present invention can be implemented usinghardware and/or software that are within the scope of one skilled in theart. The embodiments of the description have been presented forclarification purposes; however, the invention is defined by thefollowing claims.

1. A computer-implemented method for dynamically allocating identifiervalues to a second stream depending upon a first stream in amulti-encrypted transport stream, the method comprising the steps of:determining, by a control system, a plurality of identifier values ofthe first stream, wherein each determined identifier value is consideredto be in use; and assigning identifier values, by an encryption device,to the second stream based upon unused identifier values of the firststream, wherein the steps are continuously cycled and the identifiervalues for the second stream are changed as necessary in order toprevent any conflicts with the identifier values between the first andthe second streams, wherein changing the identifier values for thesecond stream as necessary to prevent any conflicts between the firststream and the second stream comprises: monitoring, by the controlsystem, for dynamic changes in the first stream, changing the identifiervalues for the second stream to avoid a cross stream issue in responseto the dynamic changes, and updating, by the control system, theidentifier values based on the dynamic changes.
 2. The method of claim1, further comprising the steps of: incrementing one of a plurality ofcounters for each identifier value in the first stream; providing acount associated with each counter to a processor; and determining fromthe count all unused counters, wherein each unused counter correspondsto an unused identifier value.
 3. The method of claim 2, furthercomprising the step of clearing the count in the plurality of counterswhen each counter is full.
 4. The method of claim 2, further comprisingthe steps of: receiving the first stream from the plurality of counters,wherein the first stream comprises first encrypted packets, and a clearstream at a packet selector, determining a critical packet of the clearstream and its associated first encrypted packet; encrypting thedetermined critical packet of the clear stream with a second encryptionscheme to provide a second encrypted packet; and ensuring the secondencrypted packet has an identifier value that does not conflict with anidentifier value of the first encrypted packet.
 5. The method of claim1, further comprising the step of mapping the assigned identifier valuesto one of a program association table and a program map table, whereinthe program association table and program map table are transmittedalong with the multi-encrypted transport stream.
 6. The method of claim5, further comprising the steps of: cycling through the plurality ofcounters to determine any changes in identifier values in the firststream; detecting a change in an identifier value of the first stream;determining the changed identifier value conflicts with an equalidentifier of the second stream; and changing the equal identifier ofthe second stream to an available unused identifier value.
 7. The methodof claim 6, further comprising the step of remapping the changedidentifier of the second stream in one of the program association tableand the program map table.
 8. The method of claim 5, further comprisingthe steps of: receiving the multi-encrypted transport stream at aplurality of decryption devices, wherein the plurality of decryptiondevices decrypt one of an encrypted stream in the multi-encryptedtransport stream; at each of the plurality of decryption devices,determining a desired program in its associated encrypted stream by aprogram number in the program association table; and decrypting thedesired program by a video and audio identifier in the program maptable.
 9. The method of claim 1, wherein changing the identifier valuesfor the second stream to avoid the cross stream issue comprises changingthe identifier values for the second stream to avoid decrypting anincorrect channel.
 10. The method of claim 1, wherein changing theidentifier values for the second stream to avoid the cross stream issuecomprises changing the identifier values for the second stream toaccount for a change in physical route transporting the first stream andthe second stream.
 11. A computer-implemented method for dynamicallyallocating identifier values to a second stream depending upon a firststream in a multi-encrypted transport stream, the method comprising thesteps of: determining, by a control system, a plurality of identifiervalues of the first stream, wherein each determined identifier value isconsidered to be in use; assigning identifier values, by an encryptiondevice, to the second stream based upon unused identifier values of thefirst stream, wherein the steps are continuously cycled and theidentifier values for the second stream are changed as necessary inorder to prevent any conflicts with the identifier values between thefirst and the second streams, wherein changing the identifier values forthe second stream as necessary to prevent any conflicts between thefirst stream and the second stream comprises: monitoring, by the controlsystem, for dynamic changes in the first stream, changing the identifiervalues for the second stream to avoid a cross stream issue in responseto the dynamic changes, wherein changing the identifier values for thesecond stream to avoid the cross stream issue comprises changing theidentifier values for the second stream to avoid decrypting an incorrectchannel, and updating, by the control system, the identifier valuesbased on the dynamic changes; and mapping the assigned identifier valuesto one of a program association table and a program map table, whereinthe program association table and program map table are transmittedalong with the multi-encrypted transport stream.
 12. The method of claim11, further comprising the steps of: incrementing one of a plurality ofcounters for each identifier value in the first stream; providing acount associated with each counter to a processor; and determining fromthe count all unused counters, wherein each unused counter correspondsto an unused identifier value.
 13. The method of claim 12, furthercomprising the step of clearing the count in the plurality of counterswhen each counter is full.
 14. The method of claim 12, furthercomprising the steps of: receiving the first stream from the pluralityof counters, wherein the first stream comprises first encrypted packets,and a clear stream at a packet selector, determining a critical packetof the clear stream and its associated first encrypted packet;encrypting the determined critical packet of the clear stream with asecond encryption scheme to provide a second encrypted packet; andensuring the second encrypted packet has an identifier value that doesnot conflict with an identifier value of the first encrypted packet. 15.The method of claim 11, further comprising the steps of: cycling throughthe plurality of counters to determine any changes in identifier valuesin the first stream; detecting a change in an identifier value of thefirst stream; determining the changed identifier value conflicts with anequal identifier of the second stream; and changing the equal identifierof the second stream to an available unused identifier value.
 16. Themethod of claim 15, further comprising the step of remapping the changedidentifier of the second stream in one of the program association tableand the program map table.
 17. The method of claim 11, furthercomprising the steps of: receiving the multi-encrypted transport streamat a plurality of decryption devices, wherein the plurality ofdecryption devices decrypt one of an encrypted stream in themulti-encrypted transport stream; at each of the plurality of decryptiondevices, determining a desired program in its associated encryptedstream by a program number in the program association table; anddecrypting the desired program by a video and audio identifier in theprogram map table.
 18. A computer-implemented method for dynamicallyallocating identifier values to a second stream depending upon a firststream in a multi-encrypted transport stream, the method comprising thesteps of: determining, by a control system, a plurality of identifiervalues of the first stream, wherein each determined identifier value isconsidered to be in use; and assigning identifier values, by anencryption device, to the second stream based upon unused identifiervalues of the first stream, wherein the steps are continuously cycledand the identifier values for the second stream are changed as necessaryin order to prevent any conflicts with the identifier values between thefirst and the second streams, wherein changing the identifier values forthe second stream as necessary to prevent any conflicts between thefirst stream and the second stream comprises: monitoring, by the controlsystem, for dynamic changes in the first stream, changing the identifiervalues for the second stream to avoid a cross stream issue in responseto the dynamic changes, wherein changing the identifier values for thesecond stream to avoid the cross stream issue comprises changing theidentifier values for the second stream to account for a change inphysical route transporting the first stream and the second stream, andupdating, by the control system, the identifier values based on thedynamic changes.