WO2003017566A2 - Method for authorized displaying information distributed through public communication media - Google Patents

Method for authorized displaying information distributed through public communication media Download PDF

Info

Publication number
WO2003017566A2
WO2003017566A2 PCT/BY2001/000013 BY0100013W WO03017566A2 WO 2003017566 A2 WO2003017566 A2 WO 2003017566A2 BY 0100013 W BY0100013 W BY 0100013W WO 03017566 A2 WO03017566 A2 WO 03017566A2
Authority
WO
WIPO (PCT)
Prior art keywords
information
displaying
unit
additional
encryption
Prior art date
Application number
PCT/BY2001/000013
Other languages
French (fr)
Other versions
WO2003017566A3 (en
Inventor
Valentin Alexandrovich Michtchenko
Original Assignee
Michtchenko Valentin Alexandro
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Michtchenko Valentin Alexandro filed Critical Michtchenko Valentin Alexandro
Priority to AU2001285623A priority Critical patent/AU2001285623A1/en
Priority to PCT/BY2001/000013 priority patent/WO2003017566A2/en
Publication of WO2003017566A2 publication Critical patent/WO2003017566A2/en
Publication of WO2003017566A3 publication Critical patent/WO2003017566A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • the invention relates to the means for protection of information from unauthorized access and can be used in crypto systems for encrypting and decrypting information stored and distributed through communication media and the ether, in particular for digital TV, for receiving and displaying audio and video information.
  • a crypto system with public RCA keys is known. This system is described in the U.S. Patent No. 4,405,829, entitled “Cryptographic Communications System and Method", issued on Sept. 20, 1983, in the names of Rivest, Shamir, and Adleman. This system uses a one-side function, i.e. a discrete involution.
  • a cryptographic algorithm MZ4 [wo 00/56004, Mischenko et al.] is the algorithm for functioning theoretically stable systems with a very large degree of randomization (10 9 per each symbol of the encrypted text), which allows to provide a code that is statistically independent from the initial text. This feature allows to have stationary keys in symmetric systems. Nevertheless, this method is not quite applicable for the purposes of protection of recorded information, since the size of the encrypted text is essentially increased.
  • the cable television system provides conditional access to services.
  • the cable television system includes a headend, from which service "instances", or programs are broadcasted, a radio transmitter and a plurality of set top units for receiving the instances and selectively dencrypting the instances for display to system subscribers.
  • the service instances are encrypted using public and/or private keys provided by service providers or central authorization agents. Keys used by the set tops for selective dencryption can also be public or private in nature, and such keys may be reassigned at different times to provide a cable television system protected from piracy.
  • the system has all the drawbacks of the encryption systems including such as transmission of keys to several users.
  • a method for encrypting [WO 00/65767, Mischenko et al.], is known, which allows to transform any machine text (any file) into two encrypted files (a core file and flags), each of said filed has no meaning unlike the existing encrypting algorithms.
  • the characteristic feature of such representation is that one of the files (the core file) can have a small size (selected by the user).
  • the initial text (file) can be restored from a residual file (core) with the help of another file (flags).
  • transformation of a message in each cycle is performed in such a manner, as a result of which is formed a message ( ) transformed in the given cycle of transformation that is shorter in the length then the initial message or equal to it, and an accessory information for the given cycle (Fj).
  • the number (n) of transformation cycles of the initial message is selected from a preset criterion (for example, the size of the finally transformed message).
  • This method of encrypting allows both parts of the encrypted message to be independent. In this case, the initial text cannot be restored by using any of these parts separately.
  • this method is not quite applicable for public distribution of information, since it requires that the both encrypted parts should be transmitted through one communication channel. Besides, even in case the encrypted parts of information are transmitted through different communication channels, in order to displaye and distribute copies of the encrypted data, it is sufficient to dencrypt the main channel.
  • the aim of the invention consists in providing a safe method allowing to protect from unauthorized displaying information transmitted through public media, e.g. through the ether or a cable television network.
  • the set aim is realized in the following manner.
  • the method for distributing and displaying the initial information with protection against unauthorized displaying comprises the following operations, their sequence and regimes:
  • the said carrier is a processor, in which is implemented the algorithm of encrypting with private keys of the user or the displaying device; • recording the additionally encrypted informative part of information on an additional carrier. Thereafter the said carrier interacts with the user's equipment for displaying the initial information. After encrypting the carrier has at its output the informative part of information encrypted by the private keys of the user.
  • one encrypted part of information is additionally encrypted by a private key recorded on a smart card by the encrypting algorithm and cannot be read by any other user.
  • one encrypted part of information is additionally encrypted by the private key recorded on a smart card by the encryption algorithm and cannot be read by any other user.
  • the method is further characterized by that the main encrypting is performed in such a manner that the size of the accessory part substantially exceeds the size of the informative part.
  • the method for restoration of the initial information for displaying comprises the following features:
  • the accessory information is received as the main signal broadcasted through public media, e.g. through broadcasting station or cable television network;
  • the system for distributing information comprises data encrypting unit and a unit for transmitting one part of the encrypted information through public communication channels to any user and a unit for additional transformation of the second part of information.
  • the system further comprises an additional device for recording additionally encrypted information on a separate carrier with a processor.
  • the system for recording can additionally comprise a unit for individualization of a displaying device in the form of a device for additional encryption the second part of the encrypted information.
  • the system for displaying the encrypted information transmitted through communication media and recorded on an additional carrier comprises a receiving unit, a decrypting unit and a unit for transformation of the encrypted information into a perceived form.
  • the system further comprises a unit for individualization of a dispalying device with the unit for readout of the additional carrier and a unit for dencrypting the accessory information.
  • a system for distributing information and a displaying system can use a smart card (simm card) or another rewritable carrier as an additional carrier for the accessory information.
  • a smart card small card
  • another rewritable carrier should also have a built-in processor for additional encrypting as well as a recorded algorithm for encrypting and private keys.
  • private keys are accessories of the displaying unit.
  • Fig. 1 is a schematic diagram of a system for transmitting, implementation and displaying information.
  • Fig. 2 shows a schematic diagram of a system for encrypting and distributing information with the use of a main encryption and an additional encryption.
  • Fig. 3 illustrates a schematic diagram of a device for displaying the received information with the use of the main encryption and an additional encryption.
  • the claimed method is best illustrated by an example of broadcasting television programs, receiving thereof and subsequent dispalying on a specially equipped TV set.
  • the information subjected to transmission is most effectively encrypted by the method disclosed in WO 00/65767 (MV2).
  • MV2 WO 00/65767
  • the number of such cycles can be derived from the criterion of forming an encrypted text of a definite size, definite protection level, definite transformation time or other criterion.
  • the accessory part of information is magnified with each cycle.
  • the informative part were rather short, for example 1 Kilobyte.
  • the accessory information can have the size comparable with the size of the initial file. Namely, the accessory information is transmitted through public media. In this case unauthorized receiving and displaying information becomes inept; decryption is impossible because the accessory part of information recorded on the carrier is not associated with the initial information.
  • the short informative part can be additionally encrypted and dispatched to service centers or other agent points equipped with the devices for decryption and recording the codes for decryption, and for displaying on private receiving and displaying devices.
  • the encryption algorithm can be transmitted together with the accessory information, since it also has no connection with any information.
  • customers should have displaying devices (e.g. TV sets) equipped with special additional units with a possibility of recording on a rewritable carrier, e.g. a smart card.
  • a carrier should have a built-in processor for encrypting by a private key. If a customer is provided with a key for decryption, i.e. the informative part, which should be protected by encrypting thereof on a smart card, he can receive and encrypt programs and services encrypted in accordance with the described method. This method requires a private key for an additional encryption.
  • the key should be stored in the displaying device, preferably on an additional carrier.
  • a safe algorithm used for this encryption can be the MZ4 algorithm [WO 00/65767, Mischenko et al.].
  • a user For displaying a program on his special device, a user inserts into it a smart card and, in accordance with the conditions of the purchased right for watching or receiving information, he can receive and decrypt the respective information, obtain access to channels, databases, etc.
  • the informative part of information is decrypted, thereafter the initial information is restored, the accessory part of which is transmitted through a communication channel.
  • the accessory part of which is transmitted through a communication channel.
  • Fig 1 shows a general scheme for the system of transmitting, implementation and displaying information, comprising a unit for encryption information 1 , a unit for transmitting one part of the encrypted information (flags) 2 through public communication media, and the second part of information (core) 4.
  • the system comprises an additional unit for recording additionally encrypted information 4 on a separate carrier with a processor, e.g. a smart card 5.
  • a system for displaying the encrypted information transmitted through communication media and recorded on an additional carrier comprises a receiving unit 6, a unit 7 for decrypting information recorded on the additional carrier 5 by means of the keys recorded in the individualization unit 8 and a unit for restoring of the initial information 9 for imaging it in a perceived form on a display 10.
  • the scheme of a system for encryption and distribution of information with the use of the main and additional encryption (Fig. 2) is preferable for distributing information through a broad distributor network.
  • each distributor decrypts the core by his private keys and thereafter sends the core to the device 16 for reading/recording user's smart cards for further encrypting by user's private keys in the processor of his smart card 17.
  • the displaying device receives the accessory information through the communication media 21 by means of a common receiving device 22 and transmits the data to the decrypting device 23.
  • the displaying device additionally comprises a device for reading/recording of smart cards, which is connected to the unit for additional decryption by individual keys 26 of the displaying device, which keys are recorded in the memory 27.
  • the core recovered in the additional decoder 26 arrives at the main decoder 23 and participates in the process of the main decryption of the transmitted information into the form useful for imaging on the display 28.
  • the system allows to protect from unauthorized displaying information transmitted in accordance with the pre-announced program, e.g. movies, recorded programs, informational data, such as data bases, etc.
  • the method and the system asumes that a user should purchase in advance the right to watch or to have an access to data.
  • the system and the method can be also used for transmitting the encrypting/decrypting information itself, e.g. dynamic keys of a large length disabling to select within the real time limits the keys or other means for breaking the encrypted information.

Abstract

The invention can be used in crypto systems for encrypting and decrypting information distributed through communication media and the ether, in particular for digital TV for receiving and displaying audio video information. Instead of transmitting encrypted content information, the accessory part of information is distributed through public communication media. The short encrypted content is distributed on a smart card with processor. Additional encryption by an individual user's key is provided. The system allows to protect from unauthorized displaying information transmitted in accordance with the pre-announced program, e.g. movies, recorded programs, informational data, such as data bases, etc. The method and the system imply that a user should purchase in advance the right to watch or to have an access to data.

Description

METHOD FOR AUTHORIZED DISPLAYING INFORMATION DISTRIBUTED THROUGH PUBLIC COMMUNICATION MEDIA
Description FIELD OF INVENTION
The invention relates to the means for protection of information from unauthorized access and can be used in crypto systems for encrypting and decrypting information stored and distributed through communication media and the ether, in particular for digital TV, for receiving and displaying audio and video information.
BACKGROUND OF INVENTION
Systems for protection of information by using the method for encrypting, transmission the encrypted message and subsequent decrypting thereof at readout or displaying are known. In this case, different systems of encrypting are used.
Systems with secret or private keys such as DES have insufficient stability because encrypted information is semanticaily connected with the initial information. Moreover, such systems have a problem of keys distribution.
A crypto system with public RCA keys is known. This system is described in the U.S. Patent No. 4,405,829, entitled "Cryptographic Communications System and Method", issued on Sept. 20, 1983, in the names of Rivest, Shamir, and Adleman. This system uses a one-side function, i.e. a discrete involution.
The drawback of these systems is a short key length, which allows to perform decrypting in acceptable time limits. At the increase of the key length the speed of encrypting becomes unacceptable for real-time displaying.
A cryptographic algorithm MZ4 [wo 00/56004, Mischenko et al.] is the algorithm for functioning theoretically stable systems with a very large degree of randomization (109 per each symbol of the encrypted text), which allows to provide a code that is statistically independent from the initial text. This feature allows to have stationary keys in symmetric systems. Nevertheless, this method is not quite applicable for the purposes of protection of recorded information, since the size of the encrypted text is essentially increased.
The closest in essence invention of the prior art is the system described in the US patent No. 6,252,964, Wasilewski A, et al. "Authorization of services in a conditional access system".
The cable television system provides conditional access to services. The cable television system includes a headend, from which service "instances", or programs are broadcasted, a radio transmitter and a plurality of set top units for receiving the instances and selectively dencrypting the instances for display to system subscribers. The service instances are encrypted using public and/or private keys provided by service providers or central authorization agents. Keys used by the set tops for selective dencryption can also be public or private in nature, and such keys may be reassigned at different times to provide a cable television system protected from piracy. However, the system has all the drawbacks of the encryption systems including such as transmission of keys to several users.
A method for encrypting [WO 00/65767, Mischenko et al.], is known, which allows to transform any machine text (any file) into two encrypted files (a core file and flags), each of said filed has no meaning unlike the existing encrypting algorithms. The characteristic feature of such representation is that one of the files (the core file) can have a small size (selected by the user). Unlike the hash-function operation, here the initial text (file) can be restored from a residual file (core) with the help of another file (flags). According to this method, transformation of a message in each cycle is performed in such a manner, as a result of which is formed a message ( ) transformed in the given cycle of transformation that is shorter in the length then the initial message or equal to it, and an accessory information for the given cycle (Fj). The number (n) of transformation cycles of the initial message is selected from a preset criterion (for example, the size of the finally transformed message).
The method further consists in forming an encrypted message consisting of two parts, one of which contains the finally transformed message (Cn) that is shorter in the length than the initial message, and the second part contains a set of the accessory information (F = {F-i, F2, ..., Fπ} - flags).
This method of encrypting allows both parts of the encrypted message to be independent. In this case, the initial text cannot be restored by using any of these parts separately.
Nevertheless, this method is not quite applicable for public distribution of information, since it requires that the both encrypted parts should be transmitted through one communication channel. Besides, even in case the encrypted parts of information are transmitted through different communication channels, in order to displaye and distribute copies of the encrypted data, it is sufficient to dencrypt the main channel.
The aim of the invention consists in providing a safe method allowing to protect from unauthorized displaying information transmitted through public media, e.g. through the ether or a cable television network. The set aim is realized in the following manner.
The method for distributing and displaying the initial information with protection against unauthorized displaying comprises the following operations, their sequence and regimes:
- performing the main encrypting of information in such a manner, as a result of which two independent parts are formed: an informative part (core) and an accessory part (flags), each of the parts cannot apart displaye the initial information even in its separate parts;
• transmitting the accessory part of information and the keys for main encryption by any user; • cyclic changing the keys;
• additional encrypting of the informative part of information (core) by private keys of the user recorded on an additional carrier. The said carrier is a processor, in which is implemented the algorithm of encrypting with private keys of the user or the displaying device; • recording the additionally encrypted informative part of information on an additional carrier. Thereafter the said carrier interacts with the user's equipment for displaying the initial information. After encrypting the carrier has at its output the informative part of information encrypted by the private keys of the user. Thus, one encrypted part of information is additionally encrypted by a private key recorded on a smart card by the encrypting algorithm and cannot be read by any other user.
• Thus, one encrypted part of information is additionally encrypted by the private key recorded on a smart card by the encryption algorithm and cannot be read by any other user.
The method is further characterized by that the main encrypting is performed in such a manner that the size of the accessory part substantially exceeds the size of the informative part. The method for restoration of the initial information for displaying comprises the following features:
- interaction of the additional data carrier in the displaying equipment is performed in such a manner that the informative part of information is additionally dencrypted by the private keys of the user's equipment and by the algorithm for additional dencryption;
- the accessory information is received as the main signal broadcasted through public media, e.g. through broadcasting station or cable television network;
- the initial information is restored in the displaying equipment by performing the operation of main dencrypting at the interaction of the accessory part of information received through the public channel and of the informative part restored in the displaying equipment. The system for distributing information comprises data encrypting unit and a unit for transmitting one part of the encrypted information through public communication channels to any user and a unit for additional transformation of the second part of information. The system further comprises an additional device for recording additionally encrypted information on a separate carrier with a processor.
The system for recording can additionally comprise a unit for individualization of a displaying device in the form of a device for additional encryption the second part of the encrypted information.
The system for displaying the encrypted information transmitted through communication media and recorded on an additional carrier comprises a receiving unit, a decrypting unit and a unit for transformation of the encrypted information into a perceived form.
The system further comprises a unit for individualization of a dispalying device with the unit for readout of the additional carrier and a unit for dencrypting the accessory information.
A system for distributing information and a displaying system can use a smart card (simm card) or another rewritable carrier as an additional carrier for the accessory information. Preferably, such carrier should also have a built-in processor for additional encrypting as well as a recorded algorithm for encrypting and private keys. In this case, private keys are accessories of the displaying unit.
BRIEF DESCRIPTION OF DRAWINGS
Fig. 1 is a schematic diagram of a system for transmitting, implementation and displaying information.
Fig. 2 shows a schematic diagram of a system for encrypting and distributing information with the use of a main encryption and an additional encryption.
Fig. 3 illustrates a schematic diagram of a device for displaying the received information with the use of the main encryption and an additional encryption.
Embodiments of invention
The claimed method is best illustrated by an example of broadcasting television programs, receiving thereof and subsequent dispalying on a specially equipped TV set.
Protection from unauthorized dispalying has always been a challenge for television that provides mass and cheap distribution of information and services. Generally, television broadcasting consists in transmitting information, movies, musical programs, etc. through the ether or cable channels. Nowadays, physically it is rather easy to receive the information and to decrypt it, or to use one legal code for receiving and watching by many users.
According to the proposed method, the information subjected to transmission is most effectively encrypted by the method disclosed in WO 00/65767 (MV2). During the process of such encryption a preset number of encryption cycles is carried out, as a result of each cycle the encrypted information is shortened (compressed).
This process results in forming in every cycle an accessory information bearing data about transformation within the cycle, but as a matter of fact having no connections with the initial information.
The number of such cycles can be derived from the criterion of forming an encrypted text of a definite size, definite protection level, definite transformation time or other criterion. In this case, the accessory part of information is magnified with each cycle. In accordance with this method it is preferable, that the informative part were rather short, for example 1 Kilobyte. The accessory information can have the size comparable with the size of the initial file. Namely, the accessory information is transmitted through public media. In this case unauthorized receiving and displaying information becomes inept; decryption is impossible because the accessory part of information recorded on the carrier is not associated with the initial information. The short informative part can be additionally encrypted and dispatched to service centers or other agent points equipped with the devices for decryption and recording the codes for decryption, and for displaying on private receiving and displaying devices.
Thus, for displaying are required both parts of the encrypted information and the encryption algorithm. In this case, the encryption algorithm can be transmitted together with the accessory information, since it also has no connection with any information. On the other side, customers should have displaying devices (e.g. TV sets) equipped with special additional units with a possibility of recording on a rewritable carrier, e.g. a smart card. Preferably, such a carrier should have a built-in processor for encrypting by a private key. If a customer is provided with a key for decryption, i.e. the informative part, which should be protected by encrypting thereof on a smart card, he can receive and encrypt programs and services encrypted in accordance with the described method. This method requires a private key for an additional encryption. The key should be stored in the displaying device, preferably on an additional carrier. A safe algorithm used for this encryption can be the MZ4 algorithm [WO 00/65767, Mischenko et al.].
For displaying a program on his special device, a user inserts into it a smart card and, in accordance with the conditions of the purchased right for watching or receiving information, he can receive and decrypt the respective information, obtain access to channels, databases, etc. In this case, at first the informative part of information is decrypted, thereafter the initial information is restored, the accessory part of which is transmitted through a communication channel. Thereby is provided full protection from unauthorized access and displaying information distributed through public media accessible to general public, because in this case simple displaying a signal that does not carry any initial information is useless. Additional encryption of the informative part of information by an private key makes the decryption thereof impossible, since this part itself has no meaning. Besides, the initial information can be displayed only on a special displaying device provided with a private key.
Fig 1 shows a general scheme for the system of transmitting, implementation and displaying information, comprising a unit for encryption information 1 , a unit for transmitting one part of the encrypted information (flags) 2 through public communication media, and the second part of information (core) 4. The system comprises an additional unit for recording additionally encrypted information 4 on a separate carrier with a processor, e.g. a smart card 5.
A system for displaying the encrypted information transmitted through communication media and recorded on an additional carrier comprises a receiving unit 6, a unit 7 for decrypting information recorded on the additional carrier 5 by means of the keys recorded in the individualization unit 8 and a unit for restoring of the initial information 9 for imaging it in a perceived form on a display 10. The scheme of a system for encryption and distribution of information with the use of the main and additional encryption (Fig. 2) is preferable for distributing information through a broad distributor network.
In this case, beside encrypting in the encryption device 11 , transmitting the accessory information obtained as a result of encrypting under the claimed method via the transmitter 12 to any user through public transmission media, is performed the additional encryption of the remaining part (core) in a special device 4 for private encryption of the distributor network
Thus, each distributor decrypts the core by his private keys and thereafter sends the core to the device 16 for reading/recording user's smart cards for further encrypting by user's private keys in the processor of his smart card 17.
According to Fig. 3, the displaying device receives the accessory information through the communication media 21 by means of a common receiving device 22 and transmits the data to the decrypting device 23.
At the same time to ensure decrypting the user uses his smart card 24 with the core encrypted on it, which core provides purchasing the right for displaying the transmitted information. For this purpose the displaying device additionally comprises a device for reading/recording of smart cards, which is connected to the unit for additional decryption by individual keys 26 of the displaying device, which keys are recorded in the memory 27.
The core recovered in the additional decoder 26 arrives at the main decoder 23 and participates in the process of the main decryption of the transmitted information into the form useful for imaging on the display 28. The system allows to protect from unauthorized displaying information transmitted in accordance with the pre-announced program, e.g. movies, recorded programs, informational data, such as data bases, etc. The method and the system asumes that a user should purchase in advance the right to watch or to have an access to data. At the same time, the system and the method can be also used for transmitting the encrypting/decrypting information itself, e.g. dynamic keys of a large length disabling to select within the real time limits the keys or other means for breaking the encrypted information.

Claims

Claims 1. A method for authorized distribution, reception and displaying initial information with protection from unauthorized displaying comprising encryption of information, transmitting the encrypted information through public communication media, receiving and decryption of information with subsequent displaying, characterized in that
• main encryption of information is performed in such a manner, as a result of which two independent parts of information are formed: an informative part and an accessory part, each of the parts apart being unable to display the initial information even in the separate parts thereof.
• the accessory part of information and the keys for main encryption are transmitted through public communication media accessible to any user;
• additional encryption of the informative part of information is performed by the private keys of the user recorded on an additional carrier that is a processor, in which the algorithm of encryption with private keys of the user is implemented;
• the additionally encrypted informative part of information is recorded on the said additional carrier;
• the additional carrier interacts with the devices for displaying information;
• the informative part of information encrypted by the user's individual keys is subjected to decrypting;
• the initial information is restored and displayed.
2. A method of claim 1 , characterized in that the main encryption is performed by multiple transformation with compression in such a manner that the size of the accessory part of information substantially exceeds the size of the informative part of information.
3. A method for restoration and representation of initial information for displaying comprising
• receiving the encrypted information through a public channel,
• decrypting and displaying the restored information, characterized in that the following further steps are performed
• said additional information carrier interacts with the displaying device in such a manner that the recorded code is readout and the informative part of information is additionally decrypted by means of the user's private keys and the algorithm for additional decryption;
• displaying of the initial information is restored in the apparatus by performing the process of the main decryption with the use of the accessory part of information received through communication media and the informative part restored in the displaying device as a result of additional decryption.
4. A system for authorized transmission of information through public media, comprising a unit for encryption of information, a unit for transmission of information and a unit for additional transformation of the accessory information, characterized in that said system further comprises an encryption device and a device for recording additionally encrypted information on an additional carrier.
5. A system for displaying encrypted information recorded on a carrier comprising a reception unit, a decryption unit, a unit for transforming the decrypted information into a perceivable form, characterized in that each displaying device in the system further comprises a unit for individualization of the displaying device and a unit for decryption of the accessory information; a unit for readout/record on the additional carrier being further connected to the unit for individualization of the displaying device.
6. A system for transmission and displaying of claims 4, 5, characterized in that as an additional carrier of the accessory information is used a smart card with a processor.
PCT/BY2001/000013 2001-08-20 2001-08-20 Method for authorized displaying information distributed through public communication media WO2003017566A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2001285623A AU2001285623A1 (en) 2001-08-20 2001-08-20 Method for authorized displaying information distributed through public communication media
PCT/BY2001/000013 WO2003017566A2 (en) 2001-08-20 2001-08-20 Method for authorized displaying information distributed through public communication media

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/BY2001/000013 WO2003017566A2 (en) 2001-08-20 2001-08-20 Method for authorized displaying information distributed through public communication media

Publications (2)

Publication Number Publication Date
WO2003017566A2 true WO2003017566A2 (en) 2003-02-27
WO2003017566A3 WO2003017566A3 (en) 2004-02-19

Family

ID=4083758

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/BY2001/000013 WO2003017566A2 (en) 2001-08-20 2001-08-20 Method for authorized displaying information distributed through public communication media

Country Status (2)

Country Link
AU (1) AU2001285623A1 (en)
WO (1) WO2003017566A2 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6035329A (en) * 1995-12-07 2000-03-07 Hyperlock Technologies, Inc. Method of securing the playback of a DVD-ROM via triggering data sent via a cable network
WO2000065767A1 (en) * 1999-04-27 2000-11-02 Mischenko Valentin Alexandrovi Method for encrypting information and device for realization of the method
US6252964B1 (en) * 1995-04-03 2001-06-26 Scientific-Atlanta, Inc. Authorization of services in a conditional access system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6252964B1 (en) * 1995-04-03 2001-06-26 Scientific-Atlanta, Inc. Authorization of services in a conditional access system
US6035329A (en) * 1995-12-07 2000-03-07 Hyperlock Technologies, Inc. Method of securing the playback of a DVD-ROM via triggering data sent via a cable network
WO2000065767A1 (en) * 1999-04-27 2000-11-02 Mischenko Valentin Alexandrovi Method for encrypting information and device for realization of the method

Also Published As

Publication number Publication date
WO2003017566A3 (en) 2004-02-19
AU2001285623A1 (en) 2003-03-03

Similar Documents

Publication Publication Date Title
US4887296A (en) Cryptographic system for direct broadcast satellite system
US7336784B2 (en) Multimedia decoder method and system with authentication and enhanced digital rights management (DRM) where each received signal is unique and where the missing signal is cached inside the storage memory of each receiver
US6005938A (en) Preventing replay attacks on digital information distributed by network service providers
CN1144462C (en) Prepay broadcast system with enhanced secret measure to prevent illegal watching downloaded program
US6266415B1 (en) Process for protecting an information item transmitted from a security element to a decoder and protection system using such a process
US8724808B2 (en) Method for secure distribution of digital data representing a multimedia content
US8548167B2 (en) System for traceable decryption of bandwidth-efficient broadcast of encrypted messages and security module revocation method used for securing broadcasted messages
JPH06125554A (en) Protective method for encoding of sunscribed satellite television
WO2001065762A2 (en) Conditional access system and method for prevention of replay attacks
KR20010053539A (en) Method and apparatus for secure communication of information between a plurality of digital audiovisual devices
CN1284818A (en) Full digital conditioned receiving method for video broadcost in cable TV network
CN103535044A (en) Method of protecting a recorded multimedia content
EP0179612A2 (en) Cryptographic system for direct broadcast satellite network
CN1323554C (en) Device for processing and method for transmission of encoded data for a first domain in a network pertaining to a second domain
US20130046969A1 (en) Methods for decrypting, transmitting and receiving control words, recording medium and control word server to implement these methods
US20020108040A1 (en) Threshold cryptography scheme for conditional access systems
JP4740859B2 (en) Portable safety module pairing
EP1440578B1 (en) Conditional access system and copy protection
JP5031305B2 (en) Content receiving apparatus and content decoding program
CN100385941C (en) Method for processing encoded data for a first domain received in a network pertaining to a second domain
JP4692070B2 (en) Information processing system, information processing apparatus, information processing method, and program
KR100977969B1 (en) Methods for transmitting and receiving data in a network
JP2002158651A (en) Chain key broadcast reception system and chain key broadcast receiving method
KR100497336B1 (en) Conversion method of entitlement message for public key infrastructure based on conditional access system
WO2003017566A2 (en) Method for authorized displaying information distributed through public communication media

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ PL PT RO RU SE SG SI SK SL TJ TM TR TT TZ UA US UZ VN YU ZA

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZW AM AZ BY KG KZ MD TJ TM AT BE CH CY DE DK ES FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW MR NE SN TD TG US

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP