DE60229354D1 - Verfahren zur verfolgung von verräterempfängern in - Google Patents
Verfahren zur verfolgung von verräterempfängern inInfo
- Publication number
- DE60229354D1 DE60229354D1 DE60229354T DE60229354T DE60229354D1 DE 60229354 D1 DE60229354 D1 DE 60229354D1 DE 60229354 T DE60229354 T DE 60229354T DE 60229354 T DE60229354 T DE 60229354T DE 60229354 D1 DE60229354 D1 DE 60229354D1
- Authority
- DE
- Germany
- Prior art keywords
- receiver
- traitor
- subsets
- pirate
- pencils
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00224—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a remote server
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00246—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local device, e.g. device key initially stored by the player or by the recorder
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26606—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
- H04N21/4181—External card to be used in combination with the client device, e.g. for conditional access for conditional access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/433—Content storage operation, e.g. storage operation in response to a pause request, caching operations
- H04N21/4331—Caching operations, e.g. of an advertisement for later insertion during playback
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/20—Disc-shaped record carriers
- G11B2220/25—Disc-shaped record carriers characterised in that the disc is based on a specific recording technology
- G11B2220/2537—Optical discs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/601—Broadcast encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/606—Traitor tracing
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/771,239 US7010125B2 (en) | 2001-01-26 | 2001-01-26 | Method for tracing traitor receivers in a broadcast encryption system |
PCT/GB2002/000312 WO2002060118A2 (en) | 2001-01-26 | 2002-01-23 | Method for tracing traitor receivers in a broadcast encryption system |
Publications (1)
Publication Number | Publication Date |
---|---|
DE60229354D1 true DE60229354D1 (de) | 2008-11-27 |
Family
ID=25091165
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE60229354T Expired - Lifetime DE60229354D1 (de) | 2001-01-26 | 2002-01-23 | Verfahren zur verfolgung von verräterempfängern in |
Country Status (10)
Country | Link |
---|---|
US (1) | US7010125B2 (de) |
EP (1) | EP1354444B1 (de) |
JP (1) | JP2004527937A (de) |
KR (1) | KR100562982B1 (de) |
CN (1) | CN1310463C (de) |
AT (1) | ATE411665T1 (de) |
DE (1) | DE60229354D1 (de) |
HK (1) | HK1068513A1 (de) |
TW (1) | TWI222302B (de) |
WO (1) | WO2002060118A2 (de) |
Families Citing this family (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1111923A1 (de) * | 1999-12-22 | 2001-06-27 | Irdeto Access B.V. | Verfahren zum betrieben eines Systems mit bedingtem Zugang für Fernsehrundfunksanwendungen |
HU229298B1 (hu) * | 2000-06-21 | 2013-10-28 | Sony Corp | Eljárás és berendezés információk rögzítésére és/vagy lejátszására |
US9520993B2 (en) * | 2001-01-26 | 2016-12-13 | International Business Machines Corporation | Renewable traitor tracing |
JP2002319932A (ja) * | 2001-04-19 | 2002-10-31 | Sony Corp | 情報記録装置、情報再生装置、および情報記録方法、情報再生方法、並びにプログラム |
JP3917507B2 (ja) * | 2002-01-28 | 2007-05-23 | 株式会社東芝 | コンテンツ提供側システム、ユーザ側システム、追跡システム、コンテンツ提供方法、暗号化コンテンツ復号方法、不正ユーザ特定方法、暗号化装置、復号装置及びプログラム |
US7450722B2 (en) * | 2002-12-13 | 2008-11-11 | General Instrument Corporation | Subset difference method for multi-cast rekeying |
US20040128259A1 (en) * | 2002-12-31 | 2004-07-01 | Blakeley Douglas Burnette | Method for ensuring privacy in electronic transactions with session key blocks |
DE602004029555D1 (de) * | 2003-01-15 | 2010-11-25 | Panasonic Corp | Inhaltsschutzsystem, endgerät, endgerätmethode und speichermedium |
FR2850826B1 (fr) * | 2003-02-04 | 2005-04-01 | Medialive | Procede et dispositif de protection pour la diffusion securisee d'oeuvres audiovisuelles |
WO2004107635A2 (en) * | 2003-05-21 | 2004-12-09 | Docomo Communications Laboratories Usa, Inc. | Broadcast encryption using rsa |
FR2856539A1 (fr) * | 2003-06-17 | 2004-12-24 | France Telecom | Procede et systeme tracables de chiffrement et/ou de dechiffrement d'informations, et supports d'enregistrement pour la mise en oeuvre du procede |
KR101148497B1 (ko) * | 2003-08-05 | 2012-05-21 | 파나소닉 주식회사 | 저작권 보호 시스템 |
JP4161859B2 (ja) | 2003-09-11 | 2008-10-08 | ソニー株式会社 | 情報処理装置、情報記録媒体、および情報処理方法、並びにコンピュータ・プログラム |
KR20060113743A (ko) * | 2003-11-28 | 2006-11-02 | 마츠시타 덴끼 산교 가부시키가이샤 | 관리장치, 단말장치 및 저작권 보호시스템 |
KR100579515B1 (ko) * | 2004-10-08 | 2006-05-15 | 삼성전자주식회사 | 브로드캐스트 암호화를 위한 키 생성 장치 및 방법 |
US7454021B2 (en) * | 2004-10-29 | 2008-11-18 | Hewlett-Packard Development Company, L.P. | Off-loading data re-encryption in encrypted data management systems |
KR101092543B1 (ko) * | 2004-11-12 | 2011-12-14 | 삼성전자주식회사 | 브로드캐스트 암호화를 위한 사용자 키 관리 방법 |
US8090105B2 (en) * | 2004-11-24 | 2012-01-03 | International Business Machines Corporation | Broadcast encryption with dual tree sizes |
JP4599194B2 (ja) * | 2005-03-08 | 2010-12-15 | 株式会社東芝 | 復号装置、復号方法、及びプログラム |
KR100717005B1 (ko) * | 2005-04-06 | 2007-05-10 | 삼성전자주식회사 | 폐기 키를 결정하는 방법 및 장치와 이것을 이용하여복호화하는 방법 및 장치 |
KR100970391B1 (ko) | 2005-04-19 | 2010-07-15 | 삼성전자주식회사 | 브로드 캐스트 암호화 시스템에서의 태그 형성방법 |
WO2006112635A1 (en) * | 2005-04-19 | 2006-10-26 | Samsung Electronics Co., Ltd | Tag generation method in broadcast encryption system |
US8161296B2 (en) * | 2005-04-25 | 2012-04-17 | Samsung Electronics Co., Ltd. | Method and apparatus for managing digital content |
US7711114B2 (en) * | 2005-09-19 | 2010-05-04 | International Business Machines Corporation | System and method for assigning sequence keys to a media player to enable flexible traitor tracing |
US7630497B2 (en) * | 2005-09-19 | 2009-12-08 | International Business Machines Corporation | System and method for assigning sequence keys to a media player to enable hybrid traitor tracing |
KR100803596B1 (ko) | 2005-11-25 | 2008-02-19 | 삼성전자주식회사 | 폐기 메커니즘 상에서 외부 디바이스 또는 서비스를이용하는 복호화 방법 및 장치, 이를 위한 복호화 지원방법 및 장치 |
US8176568B2 (en) | 2005-12-30 | 2012-05-08 | International Business Machines Corporation | Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system |
US7756035B2 (en) * | 2006-01-31 | 2010-07-13 | Nortel Networks Limited | Planning routes and allocating identifiers to routes in a managed frame-forwarding network |
FR2899748B1 (fr) * | 2006-04-07 | 2008-11-28 | Thales Sa | Schema de diffusion hybride efficace, adapte a une faible bande passante |
EP2022207B1 (de) * | 2006-05-31 | 2018-10-10 | Orange | Kryptografisches verfahren mit integrierter verschlüsselung und aufhebung, system, verfahren und programme zur implementierung dieses verfahrens |
EP1890493A1 (de) * | 2006-08-17 | 2008-02-20 | Nagracard S.A. | Verfahren zum Widerrufen von Sicherheitsmodulen zur Sicherung Rundfunknachrichten |
JP4984827B2 (ja) * | 2006-10-30 | 2012-07-25 | ソニー株式会社 | 鍵生成装置、暗号化装置、受信装置、鍵生成方法、暗号化方法、鍵処理方法、およびプログラム |
US7986787B2 (en) * | 2006-12-08 | 2011-07-26 | International Business Machines Corporation | System, method, and service for tracing traitors from content protection circumvention devices |
EP2104987A2 (de) * | 2007-01-11 | 2009-09-30 | Koninklijke Philips Electronics N.V. | Ortung von kopien einer implementierung |
US8290157B2 (en) * | 2007-02-20 | 2012-10-16 | Sony Corporation | Identification of a compromised content player |
US7876895B2 (en) * | 2007-05-09 | 2011-01-25 | International Business Machines Corporation | System, method, and service for performing unified broadcast encryption and traitor tracing for digital content |
US7975313B2 (en) | 2007-08-14 | 2011-07-05 | International Business Machines Corporation | System and method for tracing Tardos fingerprint codes |
US8824685B2 (en) * | 2007-10-15 | 2014-09-02 | Sony Corporation | Method for detection of a hacked decoder |
EP2068490A1 (de) | 2007-12-05 | 2009-06-10 | Nagravision S.A. | Verfahren zum Erzeugen eines privaten Schlüssels in einem Boneh-Franklin-Schema |
EP2073431A1 (de) | 2007-12-21 | 2009-06-24 | Nagravision S.A. | Verfahren zur Rückverfolgung rückverfolgbarer Teile privater Originalschlüssel in einem Verschlüsselungssystem mit öffentlichen Schlüsseln |
US8306220B2 (en) * | 2008-01-17 | 2012-11-06 | Nagravision S.A. | Method to generate a private key in a boneh-franklin scheme |
US7936882B2 (en) * | 2008-01-17 | 2011-05-03 | Nagravision S.A. | Method to trace traceable parts of original private keys in a public-key cryptosystem |
US8499149B2 (en) * | 2008-02-20 | 2013-07-30 | Hewlett-Packard Development Company, L.P. | Revocation for direct anonymous attestation |
US9729316B2 (en) * | 2008-02-27 | 2017-08-08 | International Business Machines Corporation | Unified broadcast encryption system |
CN101534428B (zh) * | 2008-03-12 | 2011-01-19 | 北京视博数字电视科技有限公司 | 一种动态叛逆者追踪方法及系统 |
CN101534429B (zh) * | 2008-03-12 | 2011-02-09 | 北京视博数字电视科技有限公司 | 盗版者追踪方法和系统 |
KR101485460B1 (ko) * | 2008-06-09 | 2015-01-23 | 삼성전자주식회사 | 브로드캐스트 암호화에서 디바이스 키를 추적하는 방법 |
US8108928B2 (en) * | 2008-06-20 | 2012-01-31 | International Business Machines Corporation | Adaptive traitor tracing |
US8122501B2 (en) * | 2008-06-20 | 2012-02-21 | International Business Machines Corporation | Traitor detection for multilevel assignment |
EP2151763A1 (de) * | 2008-07-28 | 2010-02-10 | Nagravision S.A. | Verfahren und Verfahren zur Verschleierung virtueller oder physischer Speicherabbildung |
US8422684B2 (en) * | 2008-08-15 | 2013-04-16 | International Business Machines Corporation | Security classes in a media key block |
US8897448B2 (en) * | 2008-10-31 | 2014-11-25 | Ciena Corporation | Controlling session keys through in-band signaling |
US8189789B2 (en) * | 2008-11-03 | 2012-05-29 | Telcordia Technologies, Inc. | Intrusion-tolerant group management for mobile ad-hoc networks |
US8571209B2 (en) | 2009-01-19 | 2013-10-29 | International Business Machines | Recording keys in a broadcast-encryption-based system |
US9455992B2 (en) * | 2009-06-12 | 2016-09-27 | Microsoft Technology Licensing, Llc | Trusted hardware component for distributed systems |
EP2543158B1 (de) * | 2010-03-03 | 2014-09-17 | Nagravision S.A. | Verfahren zur Verwaltung von Annullierungen in einer Endgerätegruppe |
EP2393292A1 (de) | 2010-06-01 | 2011-12-07 | Nagravision S.A. | Verfahren und Vorrichtung zum Entschlüsseln von verschlüsseltem Inhalt |
US8396896B2 (en) * | 2010-11-10 | 2013-03-12 | International Business Machines Corporation | Assigning resources to a binary tree structure |
US9071421B2 (en) | 2010-12-15 | 2015-06-30 | Microsoft Technology Licensing, Llc | Encrypted content streaming |
MX2013011549A (es) | 2011-04-15 | 2013-11-01 | Nagravision Sa | Metodo para identificar el origen de un modulo de seguridad en un sistema decodificador de television de paga. |
US10467384B2 (en) * | 2016-05-18 | 2019-11-05 | International Business Machines Corporation | Subset-difference broadcast encryption with blacklisting |
EP3280146A1 (de) * | 2016-08-04 | 2018-02-07 | Nagravision SA | Traitor-verfolgung |
US10104088B2 (en) | 2016-09-28 | 2018-10-16 | International Business Machines Corporation | Traitor tracing for obfuscated credentials |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4417338A (en) * | 1981-04-13 | 1983-11-22 | Wisconsin Alumni Research Foundation | Cryptographic key sharing circuit and method using code correction |
JPH03272293A (ja) * | 1990-03-22 | 1991-12-03 | Pioneer Electron Corp | テレビジョン信号のスクランブル方法および装置 |
US5124984A (en) * | 1990-08-07 | 1992-06-23 | Concord Communications, Inc. | Access controller for local area network |
US5241597A (en) | 1991-02-01 | 1993-08-31 | Motorola, Inc. | Method for recovering from encryption key variable loss |
US5675649A (en) | 1995-11-30 | 1997-10-07 | Electronic Data Systems Corporation | Process for cryptographic key generation and safekeeping |
US5812670A (en) | 1995-12-28 | 1998-09-22 | Micali; Silvio | Traceable anonymous transactions |
US5748736A (en) | 1996-06-14 | 1998-05-05 | Mittra; Suvo | System and method for secure group communications via multicast or broadcast |
US5974151A (en) * | 1996-11-01 | 1999-10-26 | Slavin; Keith R. | Public key cryptographic system having differential security levels |
DE19649292A1 (de) | 1996-11-28 | 1998-06-04 | Deutsche Telekom Ag | Verfahren zum Sichern eines durch eine Schlüsselhierarchie geschützten Systems |
US6285991B1 (en) | 1996-12-13 | 2001-09-04 | Visa International Service Association | Secure interactive electronic account statement delivery system |
US5920861A (en) * | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
ES2265466T3 (es) * | 1997-03-21 | 2007-02-16 | Thomson Licensing | Descarga de datos. |
US6397329B1 (en) | 1997-11-21 | 2002-05-28 | Telcordia Technologies, Inc. | Method for efficiently revoking digital identities |
US6098056A (en) * | 1997-11-24 | 2000-08-01 | International Business Machines Corporation | System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet |
US6247127B1 (en) | 1997-12-19 | 2001-06-12 | Entrust Technologies Ltd. | Method and apparatus for providing off-line secure communications |
US6118873A (en) * | 1998-04-24 | 2000-09-12 | International Business Machines Corporation | System for encrypting broadcast programs in the presence of compromised receiver devices |
IL126472A0 (en) | 1998-10-07 | 1999-08-17 | Nds Ltd | Secure communications system |
TW460846B (en) * | 1998-12-10 | 2001-10-21 | Toshiba Corp | Data recording media having certification information |
US6684331B1 (en) | 1999-12-22 | 2004-01-27 | Cisco Technology, Inc. | Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure |
ATE488094T1 (de) | 2000-12-22 | 2010-11-15 | Irdeto Eindhoven B V | System mit bedingtem zugriff |
-
2001
- 2001-01-26 US US09/771,239 patent/US7010125B2/en not_active Expired - Lifetime
-
2002
- 2002-01-22 TW TW091100939A patent/TWI222302B/zh not_active IP Right Cessation
- 2002-01-23 KR KR1020037009629A patent/KR100562982B1/ko active IP Right Grant
- 2002-01-23 EP EP02710110A patent/EP1354444B1/de not_active Expired - Lifetime
- 2002-01-23 AT AT02710110T patent/ATE411665T1/de not_active IP Right Cessation
- 2002-01-23 DE DE60229354T patent/DE60229354D1/de not_active Expired - Lifetime
- 2002-01-23 WO PCT/GB2002/000312 patent/WO2002060118A2/en active IP Right Grant
- 2002-01-23 CN CNB02804133XA patent/CN1310463C/zh not_active Expired - Lifetime
- 2002-01-23 JP JP2002560332A patent/JP2004527937A/ja not_active Withdrawn
-
2005
- 2005-03-10 HK HK05102080A patent/HK1068513A1/xx not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
JP2004527937A (ja) | 2004-09-09 |
KR100562982B1 (ko) | 2006-03-23 |
US7010125B2 (en) | 2006-03-07 |
EP1354444A2 (de) | 2003-10-22 |
CN1310463C (zh) | 2007-04-11 |
EP1354444B1 (de) | 2008-10-15 |
US20020133701A1 (en) | 2002-09-19 |
ATE411665T1 (de) | 2008-10-15 |
WO2002060118A3 (en) | 2002-09-19 |
CN1554163A (zh) | 2004-12-08 |
WO2002060118A2 (en) | 2002-08-01 |
KR20030085126A (ko) | 2003-11-03 |
TWI222302B (en) | 2004-10-11 |
HK1068513A1 (en) | 2005-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60229354D1 (de) | Verfahren zur verfolgung von verräterempfängern in | |
DE60233929D1 (de) | Verfahren zur verbreitung von verschlüsselten daten | |
DE602004004029D1 (de) | Verfahren zur Verteilung von Konferenzschlüsseln, gemäss einem Identitätsbasierten Verschlüsselungssystem. | |
Ourique et al. | Angle QIM: A novel watermark embedding scheme robust against amplitude scaling distortions | |
ATE490618T1 (de) | Sichere multicast-übertragung | |
US20100043081A1 (en) | Detecting and Revoking Pirate Redistribution of Content | |
HK1073934A1 (en) | System and method performing quadrature amplitude modulation by combining co-sets and strongly codedco-set indentifiers | |
RU2009105072A (ru) | Методики кодирования и декодирования цифрового видео с переменным разрешением | |
MY117019A (en) | A decoding method for processing encrypted video data | |
DE3280237D1 (de) | Sicherheitssystem fuer sstv-verschluesselung. | |
NO20015908D0 (no) | Informasjonsprosesseringssystem og fremgangsmåte | |
WO2006034428A3 (en) | Apparatus and method for identity-based encryption within a conventional public-key infrastructure | |
CA2187313A1 (en) | Method and apparatus for transmitting and receiving encrypted signals | |
DE69816986D1 (de) | Verfahren und vorrichtung zur versiegelung und unterschrift von objekten | |
EP0292247A3 (de) | Authentifizierer | |
DE59801343D1 (de) | Verfahren und vorrichtung zum codieren eines zeitdiskreten stereosignals | |
RU2016102324A (ru) | Обработка сигналов | |
Rajput et al. | An efficient audio steganography technique to hide text in audio | |
KR970031454A (ko) | 동시 음성/데이터 송신 방법 및 장치(method and apparatus for simultaneous voice/data transmission) | |
ATE536703T1 (de) | System zur bestimmung des erfolgreichen empfangs einer nachricht | |
CN103339896A (zh) | 条件存取与终端和订户设备相关联的数字内容的方法及系统 | |
ATE506810T1 (de) | Verfahren zur realizierung einer vorschau von iptv programme, und verschlüsselungsanordnung, ermächtigungscentersystem und benutzerstation | |
CN104036531A (zh) | 一种基于矢量量化以及二叉查找树的信息隐藏方法 | |
GB2553913A (en) | Media key block based broadcast encryption | |
ATE176971T1 (de) | Verfahren zur datensicherung in einem pay-tv- system unter verwendung eines kryptosystems mit öffentlichem schlüssel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8320 | Willingness to grant licences declared (paragraph 23) | ||
8364 | No opposition during term of opposition |