CA2590172A1 - Method and system for securing content in media systems - Google Patents
Method and system for securing content in media systems Download PDFInfo
- Publication number
- CA2590172A1 CA2590172A1 CA002590172A CA2590172A CA2590172A1 CA 2590172 A1 CA2590172 A1 CA 2590172A1 CA 002590172 A CA002590172 A CA 002590172A CA 2590172 A CA2590172 A CA 2590172A CA 2590172 A1 CA2590172 A1 CA 2590172A1
- Authority
- CA
- Canada
- Prior art keywords
- key
- content
- encryption element
- encryption
- media content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Abstract
A method and system for securing transfer, storage, and playback of media content. The method and system relate to securing transfer, storage, and playback of all types of media content, including television, music, electronic games, and other types of electronic data.
Claims (39)
1. A method of securing transfer, storage, and playback of media content stored on a first media access control point having a first security processor (SP) and a media content recorder (MCR), the first media access control point receiving media content from a content provider and delivering at least a portion of the received media content to the first SP, the first SP encrypting the media content for storage on the MCR and decrypting the stored media content for playback from the MCR, the method comprising:
encrypting the media content with a final content key, the final content key being determined by the first SP;
encrypting the final content key with a first SP public encryption key to create a first secured content key such that the final content key is recoverable by decrypting the first secured content key with a first SP private encryption key, the first SP public and first SP private encryption keys being associated with the first SP and stored thereon; and destroying the final content key such that the encrypted media content is undecryptable unless the first secured content key is decrypted with the first SP
private encryption key stored on the SP.
encrypting the media content with a final content key, the final content key being determined by the first SP;
encrypting the final content key with a first SP public encryption key to create a first secured content key such that the final content key is recoverable by decrypting the first secured content key with a first SP private encryption key, the first SP public and first SP private encryption keys being associated with the first SP and stored thereon; and destroying the final content key such that the encrypted media content is undecryptable unless the first secured content key is decrypted with the first SP
private encryption key stored on the SP.
2. The method of claim 1 further comprising enhancing security of the final content key by creating the final content key based on a pre-content key and a metadata hash, the first SP creating the pre-content key from a random data generator, the SP hashing metadata associated with the media content to create the metadata hash.
3. The method of claim 2 further comprising creating the final content key by exclusive-ORing the pre-content key and the metadata hash.
4. The method of claim 2 wherein the random data generator comprises a random number generator.
5. The method of claim 2 wherein the random data generator comprises a random seed data generator.
6. The method of claim 1 further comprising associating the first secured content key with metadata associated with the media content to create a first security package having the first secured content key and the metadata.
7. The method of claim 6 further comprising enhancing security of the first security package by signing the first security package to create a first secured content group, wherein the first secured content group is associated with the first SP.
8. The method of claim 7 further comprising signing the first security package by hashing the first security package and encrypting the hashed first security package with a first SP private authentication key, wherein the first SP
private authentication key is associated with the first SP.
private authentication key is associated with the first SP.
9. The method of claim 7 further comprising storing the first secured content group and the encrypted media content on the MCR.
10. The method of claim 9 further comprising receiving a request for playback of the encrypted media content stored on the MCR, locating the first secured content group associated with the requested media content, and providing the associated first secured content group to the first SP for decryption and recovery of the final content key for decrypting the requested media content.
11. The method of claim 10 further comprising authenticating the first secured content group prior to recovering the final content key with a first SP
public authentication key to ensure the metadata associated therewith is unaltered, wherein the first SP public authentication key is associated with the first SP
private authentication key.
public authentication key to ensure the metadata associated therewith is unaltered, wherein the first SP public authentication key is associated with the first SP
private authentication key.
12. The method of claim 11 further comprising recovering the final content key by decrypting the first secured content key included in the first security package with the first SP private encryption key.
13. The method of claim 10 further comprising decrypting the media content with the recovered final content key, the decrypted media content being sufficient for output to a media output device for viewing or playing.
14. The method of claim 9 further comprising receiving a request for playback of encrypted media content stored on the MCR, the request being made for a second media access control point located remotely from the first media access control point and in communication therewith through a network, the second media access control point including a second SP.
15. The method of claim 14 further comprising locating the first secured content group associated with the requested media content and providing the associated first secured content group to the first SP for decryption and recovery of the final content key for decrypting the requested media content.
16. The method of claim 15 further comprising encrypting the recovered final content key with a second SP public encryption key to create a second secured content key such that the final content key is recovered by decrypting the second secured content key with a second SP private encryption key, the second SP public and private encryption key being associated with the second SP.
17. The method of claim 16 further comprising associating the second secured content key with the metadata to create a second security package having the second secured content key and the metadata.
18. The method of claim 17 further comprising enhancing security of the second security package by signing the second security package to create a second secured content group, the second secured content group associated with the second SP.
19. The method of claim 18 further comprising signing the second security package by hashing the second security package and encrypting the hashed second security package with a second SP private authentication key, the second SP
private authentication key associated with the second SP.
private authentication key associated with the second SP.
20. The method of claim 19 further comprising transporting the second secured content package to the second SP.
21. The method of claim 20 further comprising decrypting the second secured content package with the second SP private encryption key to recover the final content key.
22. The method of claim 20 further comprising authenticating the second secured content group with a second SP public authentication key to ensure the metadata associated therewith is unaltered, wherein the second SP public authentication key is associated with the second SP private authentication key.
23. The method of claim 20 further comprising issuing an acknowledgment message from the second SP to the first SP to indicate successful recovery of the final content key and authentication of the second secured content group.
24. The method of claim 22 further comprising transporting the requested media content to the second SP for decryption with the final content key recovered by the second SP and output to a media output device.
25. A method for securing transfer, storage, and playback of media content provided to a subscriber of a media content provider, the method comprising:
receiving media content at a first security processor (SP);
encrypting the media content with a first encryption element determined from a random data generator of the first SP;
encrypting the first encryption element with a public encryption element of the first SP whereby the encrypted first encryption element is decrypted with a private encryption element of the first SP to recover the first encryption element; and destroying the first encryption element from the first SP such that the encrypted media content is decrypted by decrypting the encrypted first encryption element with the private encryption key of the first SP.
receiving media content at a first security processor (SP);
encrypting the media content with a first encryption element determined from a random data generator of the first SP;
encrypting the first encryption element with a public encryption element of the first SP whereby the encrypted first encryption element is decrypted with a private encryption element of the first SP to recover the first encryption element; and destroying the first encryption element from the first SP such that the encrypted media content is decrypted by decrypting the encrypted first encryption element with the private encryption key of the first SP.
26. The method of claim 25 further comprising outputting the encrypted first encryption element and the encrypted media content to a media content recorder (MCR) for secure storage such that the stored media content is decrypted for playing on a media output device if the encrypted first encryption element stored therewith is decrypted.
27. The method of claim 26 further comprising outputting the stored media content and the encrypted first encryption element over a network such that a network element having the private encryption key of the first SP
decrypts the encrypted first encryption element with the private encryption key to recover the first encryption element and thereby decrypt the stored media content with the recovered first encryption element.
decrypts the encrypted first encryption element with the private encryption key to recover the first encryption element and thereby decrypt the stored media content with the recovered first encryption element.
28. The method of claim 26 further comprising re-encrypting the first encryption element with a second public encryption element of a second SP
such that the re-encrypted first encryption element is decrypted with a private encryption element of the second SP to recover the first encryption element, and outputting the stored media content and the associated re-encrypted first encryption element over a network to the second SP.
such that the re-encrypted first encryption element is decrypted with a private encryption element of the second SP to recover the first encryption element, and outputting the stored media content and the associated re-encrypted first encryption element over a network to the second SP.
29. The method of claim 28 wherein re-encrypting the first encryption element includes the first SP receiving the encrypted first encryption element, the first SP decrypting the encrypted first encryption element with the private encryption element to recover the first encryption element and the first SP
re-encrypting the recovered first encryption element with the second public encryption key of the second SP.
re-encrypting the recovered first encryption element with the second public encryption key of the second SP.
30. A security processor (SP) for securing transfer, storage, and playback of media content, the SP comprising:
a random data generator for creating a randomly generated first encryption element; and wherein the SP is configured to:
encrypt the media content with the randomly generated first encryption element;
encrypt the first encryption element with a public encryption key; and destroy the first encryption element such that decryption of the encrypted first encryption element is performed with a private encryption key in order to recover the first encryption element, and recovery of the first encryption element is from the encrypted first encryption element in order to decrypt the encrypted media content.
a random data generator for creating a randomly generated first encryption element; and wherein the SP is configured to:
encrypt the media content with the randomly generated first encryption element;
encrypt the first encryption element with a public encryption key; and destroy the first encryption element such that decryption of the encrypted first encryption element is performed with a private encryption key in order to recover the first encryption element, and recovery of the first encryption element is from the encrypted first encryption element in order to decrypt the encrypted media content.
31. The SP of claim 30 further configured to present the encrypted first encryption element and encrypted media content to a media content recorder (MCR) for storage.
32. The SP of claim 31 further configured to decrypt the encrypted first encryption element with the private encryption key to recover the first encryption element.
33. The SP of claim 32 further configured to decrypt the encrypted media content with the recovered first encryption element and to output the decrypted media content to a media output device for playback.
34. The SP of claim 32 further comprising a secondary public encryption key for a secondary SP and further configured to decrypt the encrypted first encryption element with the private encryption key to recover the first encryption element and to re-encrypt the recovered first encryption element with the secondary public encryption key, wherein the re-encrypted first encryption element is presented by the SP to the secondary SP to secure transmission of the first encryption element from the SP to the secondary SP.
35. A system for securing transfer, storage, and playback of media content, the system comprising:
a first security processor (SP) configured to:
decrypt media content with a first encryption element;
encrypt the first encryption element;
destroy the first encryption element;
decrypt the encrypted first encryption element to recover the first encryption element; and decrypt the media content with the recovered first encryption element.
a first security processor (SP) configured to:
decrypt media content with a first encryption element;
encrypt the first encryption element;
destroy the first encryption element;
decrypt the encrypted first encryption element to recover the first encryption element; and decrypt the media content with the recovered first encryption element.
36. The system of claim 35 further comprising a media content recorder (MCR) in communication with the first SP for storing the encrypted media content and the encrypted first encryption element.
37. The system of claim 36 further comprising a first media output device in communication with the first SP, wherein the first SP is configured to receive the encrypted media content and encrypted first encryption element from the MCR, to decrypt the received first encryption element to recover the first encryption element, to decrypt the received media content with the recovered first encryption element, and to output the decrypted media content to the media output device for playback.
38. The system of claim 36 further comprising a second SP in communication with the first SP, wherein the first SP is configured to receive the encrypted media content and encrypted first encryption element from the MCR, to decrypt the received first encryption element to recover the first encryption element, to re-encrypt the recovered first encryption element with a public encryption element of the second SP, and to output the re-encrypted first encryption element to the second SP to secure transmission of the first encryption element from the first SP
to the second SP.
to the second SP.
39. The system of claim 38 wherein the second SP is configured to decrypt the re-encrypted first encryption element to recover the first encryption element, to decrypt the received media content with the recovered first encryption element, and to output the decrypted media content to the media output device for playback.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/006,864 US8099369B2 (en) | 2004-12-08 | 2004-12-08 | Method and system for securing content in media systems |
US11/006,864 | 2004-12-08 | ||
PCT/US2005/044078 WO2006062953A2 (en) | 2004-12-08 | 2005-12-07 | Method and system for securing content in media systems |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2590172A1 true CA2590172A1 (en) | 2006-06-15 |
CA2590172C CA2590172C (en) | 2013-10-29 |
Family
ID=36575564
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2590172A Active CA2590172C (en) | 2004-12-08 | 2005-12-07 | Method and system for securing content in media systems |
Country Status (4)
Country | Link |
---|---|
US (1) | US8099369B2 (en) |
EP (1) | EP1820292A4 (en) |
CA (1) | CA2590172C (en) |
WO (1) | WO2006062953A2 (en) |
Families Citing this family (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060031873A1 (en) * | 2004-08-09 | 2006-02-09 | Comcast Cable Holdings, Llc | System and method for reduced hierarchy key management |
US7383438B2 (en) * | 2004-12-18 | 2008-06-03 | Comcast Cable Holdings, Llc | System and method for secure conditional access download and reconfiguration |
US7933410B2 (en) * | 2005-02-16 | 2011-04-26 | Comcast Cable Holdings, Llc | System and method for a variable key ladder |
US20060200412A1 (en) * | 2005-02-23 | 2006-09-07 | Comcast Cable Holdings, Llc | System and method for DRM regional and timezone key management |
US7818350B2 (en) | 2005-02-28 | 2010-10-19 | Yahoo! Inc. | System and method for creating a collaborative playlist |
WO2006123265A1 (en) * | 2005-05-19 | 2006-11-23 | Koninklijke Philips Electronics N.V. | Authorized domain policy method |
US8997246B2 (en) * | 2005-10-04 | 2015-03-31 | Disney Enterprises, Inc. | System and/or method for authentication and/or authorization via a network |
US8306918B2 (en) | 2005-10-11 | 2012-11-06 | Apple Inc. | Use of media storage structure with multiple pieces of content in a content-distribution system |
US8396922B2 (en) * | 2005-11-18 | 2013-03-12 | Aol Inc. | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US8224751B2 (en) | 2006-05-03 | 2012-07-17 | Apple Inc. | Device-independent management of cryptographic information |
KR100781936B1 (en) * | 2006-06-20 | 2007-12-04 | 삼성전자주식회사 | Apparatus and method for controling digital right object in portable terminal |
US9178693B2 (en) * | 2006-08-04 | 2015-11-03 | The Directv Group, Inc. | Distributed media-protection systems and methods to operate the same |
US9225761B2 (en) * | 2006-08-04 | 2015-12-29 | The Directv Group, Inc. | Distributed media-aggregation systems and methods to operate the same |
US9311492B2 (en) | 2007-05-22 | 2016-04-12 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
US8347098B2 (en) * | 2007-05-22 | 2013-01-01 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
US8868463B2 (en) * | 2007-06-08 | 2014-10-21 | At&T Intellectual Property I, L.P. | System and method of managing digital rights |
US7934083B2 (en) * | 2007-09-14 | 2011-04-26 | Kevin Norman Taylor | Configurable access kernel |
US8332885B2 (en) | 2008-10-14 | 2012-12-11 | Time Warner Cable Inc. | System and method for content delivery with multiple embedded messages |
US9245583B2 (en) * | 2009-02-06 | 2016-01-26 | International Business Machines Corporation | Group control and messaging for digital video playback sessions |
US8910198B2 (en) | 2010-06-02 | 2014-12-09 | Time Warner Cable Enterprises Llc | Multicast video advertisement insertion using routing protocols |
US20120060034A1 (en) * | 2010-09-02 | 2012-03-08 | General Instrument Corporation | Digital information stream communication system and method |
US8527472B2 (en) * | 2011-03-29 | 2013-09-03 | Kaseya International Limited | Method and apparatus of securely processing data for file backup, de-duplication, and restoration |
US9231930B1 (en) | 2012-11-20 | 2016-01-05 | Amazon Technologies, Inc. | Virtual endpoints for request authentication |
US9444800B1 (en) | 2012-11-20 | 2016-09-13 | Amazon Technologies, Inc. | Virtual communication endpoint services |
US10055491B2 (en) * | 2012-12-04 | 2018-08-21 | Sonos, Inc. | Media content search based on metadata |
US9071429B1 (en) * | 2013-04-29 | 2015-06-30 | Amazon Technologies, Inc. | Revocable shredding of security credentials |
US9537934B2 (en) * | 2014-04-03 | 2017-01-03 | Facebook, Inc. | Systems and methods for interactive media content exchange |
US9703827B2 (en) * | 2014-07-17 | 2017-07-11 | Illumina Consulting Group, Inc. | Methods and apparatus for performing real-time analytics based on multiple types of streamed data |
US9690792B2 (en) * | 2014-08-26 | 2017-06-27 | International Business Machines Corporation | Access control for unprotected data storage system endpoints |
US10613938B2 (en) * | 2015-07-01 | 2020-04-07 | Actifio, Inc. | Data virtualization using copy data tokens |
US10691659B2 (en) | 2015-07-01 | 2020-06-23 | Actifio, Inc. | Integrating copy data tokens with source code repositories |
US9917690B2 (en) * | 2015-10-01 | 2018-03-13 | Time Warner Cable Enterprises Llc | Encryption management, content recording management, and playback management in a network environment |
US11494761B2 (en) * | 2015-11-06 | 2022-11-08 | Cable Television Laboratories, Inc. | Systems and methods for digital asset security ecosystems |
US11941588B2 (en) | 2015-11-06 | 2024-03-26 | Cable Television Laboratories, Inc. | Systems and methods for blockchain virtualization and scalability |
US11330226B2 (en) * | 2017-02-01 | 2022-05-10 | Sony Corporation | Information processing apparatus, information recording medium and information processing method |
US20200013431A1 (en) * | 2017-03-24 | 2020-01-09 | Sony Corporation | Information processing apparatus, information recording medium, information processing method, and program |
WO2019006185A1 (en) * | 2017-06-29 | 2019-01-03 | Activevideo Networks, Inc. | Systems and methods of orchestrated networked application services |
US10715498B2 (en) * | 2017-07-18 | 2020-07-14 | Google Llc | Methods, systems, and media for protecting and verifying video files |
US11416203B2 (en) | 2019-06-28 | 2022-08-16 | Activevideo Networks, Inc. | Orchestrated control for displaying media |
CN116636224A (en) | 2020-12-07 | 2023-08-22 | 活动视频网络有限公司 | System and method for replacing networking application program service |
Family Cites Families (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4712238A (en) | 1984-06-08 | 1987-12-08 | M/A-Com Government Systems, Inc. | Selective-subscription descrambling |
US4860353A (en) | 1988-05-17 | 1989-08-22 | General Instrument Corporation | Dynamic feedback arrangement scrambling technique keystream generator |
US5054067A (en) | 1990-02-21 | 1991-10-01 | General Instrument Corporation | Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator |
US5758257A (en) * | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US6246767B1 (en) * | 1995-04-03 | 2001-06-12 | Scientific-Atlanta, Inc. | Source authentication of download information in a conditional access system |
US6424717B1 (en) | 1995-04-03 | 2002-07-23 | Scientific-Atlanta, Inc. | Encryption devices for use in a conditional access system |
US6252964B1 (en) | 1995-04-03 | 2001-06-26 | Scientific-Atlanta, Inc. | Authorization of services in a conditional access system |
US6157719A (en) | 1995-04-03 | 2000-12-05 | Scientific-Atlanta, Inc. | Conditional access system |
US5784095A (en) | 1995-07-14 | 1998-07-21 | General Instrument Corporation | Digital audio system with video output program guide |
US5671276A (en) | 1995-07-21 | 1997-09-23 | General Instrument Corporation Of Delaware | Method and apparatus for impulse purchasing of packaged information services |
US5982363A (en) | 1997-10-24 | 1999-11-09 | General Instrument Corporation | Personal computer-based set-top converter for television services |
US7095852B2 (en) | 1998-02-13 | 2006-08-22 | Tecsec, Inc. | Cryptographic key split binder for use with tagged data elements |
US6816968B1 (en) * | 1998-07-10 | 2004-11-09 | Silverbrook Research Pty Ltd | Consumable authentication protocol and system |
US6898285B1 (en) | 2000-06-02 | 2005-05-24 | General Instrument Corporation | System to deliver encrypted access control information to support interoperability between digital information processing/control equipment |
US6976163B1 (en) | 2000-07-12 | 2005-12-13 | International Business Machines Corporation | Methods, systems and computer program products for rule based firmware updates utilizing certificate extensions and certificates for use therein |
US7069452B1 (en) | 2000-07-12 | 2006-06-27 | International Business Machines Corporation | Methods, systems and computer program products for secure firmware updates |
US6851055B1 (en) | 2000-09-30 | 2005-02-01 | Keen Personal Technologies, Inc. | Digital video recorder for encrypting/decrypting video programs in segments to facilitate trick play features |
US7577846B2 (en) | 2000-10-04 | 2009-08-18 | Nagravision Sa | Mechanism of matching between a receiver and a security module |
US20020118837A1 (en) * | 2000-12-21 | 2002-08-29 | Hamilton Jon W. | Method and system for digital image authentication center |
DE60143452D1 (en) | 2000-12-22 | 2010-12-23 | Irdeto Eindhoven B V | SYSTEM WITH CONDITIONAL ACCESS |
US20020101990A1 (en) | 2001-02-01 | 2002-08-01 | Harumi Morino | Data receiving apparatus and data reproducing apparatus |
US7046805B2 (en) | 2001-03-20 | 2006-05-16 | Digeo, Inc. | System and method for efficiently storing and processing multimedia content |
US7139398B2 (en) * | 2001-06-06 | 2006-11-21 | Sony Corporation | Time division partial encryption |
US7065213B2 (en) | 2001-06-29 | 2006-06-20 | Scientific-Atlanta, Inc. | In a subscriber network receiving digital packets and transmitting digital packets below a predetermined maximum bit rate |
BR0117132A (en) | 2001-09-25 | 2004-10-13 | Thomson Licensing Sa | Ca system for broadcast dtv using multiple keys for different service providers and service areas |
US6865555B2 (en) * | 2001-11-21 | 2005-03-08 | Digeo, Inc. | System and method for providing conditional access to digital content |
DE60213650T2 (en) | 2001-12-10 | 2007-08-09 | International Business Machines Corp. | ACCESS TO ENCRYPTED ROUND END |
US20030123667A1 (en) | 2001-12-28 | 2003-07-03 | Cable Television Laboratories, Inc. | Method for encryption key generation |
CN100479455C (en) | 2002-04-05 | 2009-04-15 | 松下电器产业株式会社 | Content using system |
JP4447821B2 (en) | 2002-04-15 | 2010-04-07 | ソニー株式会社 | Information processing apparatus and method |
US6748080B2 (en) | 2002-05-24 | 2004-06-08 | Scientific-Atlanta, Inc. | Apparatus for entitling remote client devices |
US7634659B2 (en) | 2002-09-20 | 2009-12-15 | Cable Television Laboratories, Inc. | Roaming hardware paired encryption key generation |
US20040098591A1 (en) | 2002-11-15 | 2004-05-20 | Fahrny James W. | Secure hardware device authentication method |
US7305711B2 (en) * | 2002-12-10 | 2007-12-04 | Intel Corporation | Public key media key block |
US20040177369A1 (en) | 2003-03-06 | 2004-09-09 | Akins Glendon L. | Conditional access personal video recorder |
US7620179B2 (en) | 2004-01-29 | 2009-11-17 | Comcast Cable Holdings, Llc | System and method for security processing media streams |
US20060031873A1 (en) | 2004-08-09 | 2006-02-09 | Comcast Cable Holdings, Llc | System and method for reduced hierarchy key management |
US7383438B2 (en) | 2004-12-18 | 2008-06-03 | Comcast Cable Holdings, Llc | System and method for secure conditional access download and reconfiguration |
US7933410B2 (en) | 2005-02-16 | 2011-04-26 | Comcast Cable Holdings, Llc | System and method for a variable key ladder |
US20060200412A1 (en) | 2005-02-23 | 2006-09-07 | Comcast Cable Holdings, Llc | System and method for DRM regional and timezone key management |
-
2004
- 2004-12-08 US US11/006,864 patent/US8099369B2/en active Active
-
2005
- 2005-12-07 CA CA2590172A patent/CA2590172C/en active Active
- 2005-12-07 EP EP05853090.8A patent/EP1820292A4/en not_active Withdrawn
- 2005-12-07 WO PCT/US2005/044078 patent/WO2006062953A2/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
EP1820292A4 (en) | 2013-12-25 |
US20060122946A1 (en) | 2006-06-08 |
US8099369B2 (en) | 2012-01-17 |
EP1820292A2 (en) | 2007-08-22 |
WO2006062953A3 (en) | 2007-08-23 |
WO2006062953A2 (en) | 2006-06-15 |
CA2590172C (en) | 2013-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2590172A1 (en) | Method and system for securing content in media systems | |
JP3929075B2 (en) | Method and apparatus for operating a transaction server in an owned database environment | |
US7596692B2 (en) | Cryptographic audit | |
KR101318461B1 (en) | System and method for providing authorized access to digital content | |
EP1839405B1 (en) | Network security system | |
US6549626B1 (en) | Method and apparatus for encoding keys | |
US10417392B2 (en) | Device-independent management of cryptographic information | |
JPH1195659A (en) | Method of recovering ciphered session key and device therefor | |
JPH118620A (en) | System and method for efficiently executing authentication of communication channel and facilitating detection of illegal forgery | |
US20030210791A1 (en) | Key management | |
CA2714196A1 (en) | Information distribution system and program for the same | |
CN101262332A (en) | Method and system for mutual authentication between mobile and host devices | |
JP2005245010A5 (en) | ||
KR20030001409A (en) | System and process for storing securely secret information, apparatus and server to be used in such a system and method for distribution of a digital content | |
CN101394398B (en) | Content protecting method and system oriented to terminal digital interface | |
US8479020B2 (en) | Method and apparatus for providing an asymmetric encrypted cookie for product data storage | |
JP2000115154A5 (en) | Data processing equipment and methods, and data decoding processing equipment and methods | |
CN1822165B (en) | Secure pre-recorded digital medium and descrambling and providing method of encrypted content | |
WO2014196850A1 (en) | Non-repudiable log entries for file retrieval with semi-trusted server | |
US10521564B2 (en) | Operating a device for forwarding protected content to a client unit | |
JPH11346210A (en) | Encryption method and device, decoding method and device, record medium recording encryption program, record medium recording decoding program, method for electronic signature and method for authenticating electronic signature | |
JP2002374240A5 (en) | ||
KR100977498B1 (en) | Method for Digital Rights Management | |
JP5110942B2 (en) | Information protection system | |
JP2003078517A (en) | Encrypting/decoding system, encrypting device, decoding device and key managing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |