Cryptographic method and apparatus for restricting access to...

H - Electricity – 04 – L

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

H04L 9/14 (2006.01) H04N 7/16 (2006.01) H04N 7/167 (2006.01)

Patent

CA 2307157

A system for restricting access to transmitted programming content is disclosed, which transmits a program identifier with the encrypted programming content. A set-top terminal or similar mechanism restricts access to the transmitted multimedia information using stored decryption keys. The set-top terminal receives entitlement information periodically from the head-end, corresponding to one or more packages of programs that the customer is entitled to for a given period. Each program is encrypted by the head-end server prior to transmission, using a program key, K P, which may be unique to the program. The set-top terminal uses the received program identifier, p, together with the stored entitlement information, to derive the decryption key necessary to decrypt the program. Each of the k-bit program keys, K P, used to encrypt transmitted programs is obtained by applying one or more pseudo-random hash functions, H, such as a length-doubling hash function, H, to a master key, m. The illustrative hash function, H, takes a k-bit binary value and produces a binary value having a length of 2k, with H o being the left half of the output of the hash function, and H1 being the right half of the output of the hash function. A program key, K P, is obtained by recursively applying a hash function, H o or H1, to the master key, m, depending on the corresponding binary value of each bit position of the program identifier, p. The hash operation is represented in terms of an n-level binary tree, T, referred to as the key tree, with the master key, m, placed at the root of the tree. The tree is generated by applying the hash functions H o and H, to each node, until the desired number of tree levels (n) have been created. The program keys, K P, correspond to the leaf nodes at the bottom level of the tree. The program identifier, p, associated with each program key, K P, corresponds to the path through the key tree from the root to the desired leaf node.

LandOfFree

Say what you really think

Search LandOfFree.com for Canadian inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic method and apparatus for restricting access to... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic method and apparatus for restricting access to..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic method and apparatus for restricting access to... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFCA-PAI-O-1599753

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.